BlackLotus UEFI Bootkit – First Malware to Bypass Secure Boot

0
[ad_1]
BlackLotus UEFI Bootkit

The cybersecurity analysts at ESET recently reported that BlackLotus, a sneaky bootkit for UEFI (Unified Extensible Firmware Interface), has gained notoriety as the primary malware known to successfully evade Secure Boot defenses, creating it a formidable danger.

Even on the most current Windows 11 systems with UEFI Secure Boot activated, this bootkit has the capability to run seamlessly.

The implementation of UEFI bootkits in system firmware results in the provision of full control over the boot process of the operating system. 

By exploiting this flaw, the operating system (OS)-level security mechanisms can be disabled and allow for the installation of arbitrary payloads with high privileges during the startup process.

Since October 2022, the UEFI bootkit has been available for purchase on hacking forums at a price of $5,000. Additionally, new versions of the bootkit are available at $200 each.

BlackLotus UEFI Bootkit

With a size of 80 kilobytes, this rugged and tenacious toolkit is programmed using Assembly and C. In addition, the program features geofencing capabilities to ensure that computers are not infected in the following places:-

  • Armenia
  • Belarus
  • Kazakhstan
  • Moldova
  • Romania
  • Russia
  • Ukraine

In October 2022, information regarding BlackLotus was first brought to light. During this time, Sergey Lozhkin, a Kaspersky security researcher, referred to it as a complex crimeware solution.

In essence, BlackLotus leverages a security vulnerability known as CVE-2022-21894 (also referred to as Baton Drop) to bypass UEFI Secure Boot safeguards and establish persistence.

Following successful exploitation of this vulnerability, during the early boot stages, arbitrary code is executable. Subsequently, this enables a malicious actor to execute harmful actions on a system enabled with UEFI Secure Boot without the necessity of physical access.

To date, this is the initial instance of the publicized abuse of this vulnerability in a real-world environment. It is still possible to exploit it as the affected and legitimately signed binaries are yet to be included in the revocation list of UEFI.

BlackLotus exploits this by introducing its versions of legitimate binaries that are susceptible to vulnerability into the system to take advantage of the flaw.

BlackLotus is also designed to install a kernel driver and an HTTP downloader besides having some exceptional capabilities to deactivate security mechanisms such as:- 

  • BitLocker
  • Hypervisor-protected Code Integrity (HVCI)
  • Windows Defender

These components communicate with a command-and-control (C2) server to download additional malware in either:-

There is currently no clear understanding of the precise method used to implement the bootkit. However, it appears to commence with an installer component that takes on the responsibility of composing the files to the EFI system partition. 

Following this, the installer component will disable HVCI and BitLocker, and subsequently initiate a reboot of the host. The attackers are also capable of exploiting CVE-2022-21894, exploiting it for persistence and installing the bootkit upon restarting the system.

There are a number of exploits that are implemented within this bootkit which allows the attacker to maintain control over the system by executing the kernel driver automatically upon the start-up of the system.

First, the kernel driver executes the HTTP downloader in user mode, and secondly, it executes the kernel-mode payloads in the second stage, which are all part of the next-stage HTTP download.

The actions performed by the malware are multifaceted and complex. These include downloading and executing various forms of malicious software, such as a kernel driver, DLL, or a standard executable. 

Additionally, the malware has the ability to fetch bootkit updates and even uninstall the bootkit from the system that is infected.

Numerous critical vulnerabilities that have the potential to impact the security of UEFI systems have been identified in recent years. 

However, due to the intricacies involved in the UEFI ecosystem and related supply-chain issues, many systems have remained vulnerable to these vulnerabilities long after they have been addressed, or at least after we have been informed of their resolution.

As computer systems with UEFI Secure Boot enabled have become increasingly common, it was inevitable that their vulnerabilities would be exploited by malicious actors.

Mitigations

Here below we have mentioned all the mitigations offered by the security analysts:-

  • You should always keep your system, as well as its security product, up-to-date.
  • Avoid the use of known vulnerable UEFI binaries by revoking them in the UEFI revocation database in order to bypass UEFI Secure Boot.
  • One of the challenges with revoking widely used Windows UEFI binaries is the potential for rendering a large number of systems, recovery images, and backups unbootable. Given the significant impact of such revocation, it is understandable that the process can often be slow, as it requires careful consideration and planning to minimize disruption and ensure that users are not left without access to their systems.
  • BlackLotus’ bootkit is installed over a revoked bootloader, so it can make the victim’s system inoperable if the applications are revoked. This can be remedied by reinstalling the operating system or by performing an ESP recovery.
  • As the bootkit uses a legitimate shim with a custom MOK key for persistent storage, if the revocation of the certificate would occur after BlackLotus persistence is set, then the bootkit should remain functional. To mitigate this attack, for protection purposes, it would be best to reinstall Windows as soon as possible and to make sure the attackers’ enrolled MOK key is removed using the mokutil program.

Network Security Checklist – Download Free E-Book


[ad_2]
Source link

Ransomware led to multiple DISH Network outages

0
[ad_1]

We take a look at a ransomware outbreak impacting multiple DISH Network services.

Satellite broadcast organisation DISH experienced a major system issue over the past week which affected multiple services. Websites and channels were unavailable, logins were non-functional, and some folks couldn’t even pay their bills as a result of the downtime.

There was a suspicion that something may have gone wrong behind the scenes. This suspicion has turned out to be correct, as DISH has reported to the US Securities and Exchange Commission that a ransomware attack is responsible.

A timeline of ransomware

DISH filed an 8-K form, used to inform shareholders of major events, to explain the situation. The timeline is as follows:

February 23: DISH announces on an earnings call that a network outage affected internal servers and IT telephony. Having already determined that the outage was due to a “cybersecurity incident”, law enforcement was informed and security experts were brought in to assess the situation.

February 27: DISH becomes aware that data was extracted from IT systems as a result of the ransomware attack. At this point, it’s not certain if personal information is included in the extracted data.

The filing continues:

The forensic investigation and assessment of the impact of this incident is ongoing.  DISH, Sling and our wireless and data networks remain operational; however the Corporation’s internal communications, customer call centres and internet sites have been affected.  The Corporation is actively engaged in restoring the affected systems and is making steady progress.

At this point, DISH still can’t confirm whether or not personal data has been compromised. A statement given to The Record states that customers will be contacted if this turns out to be the case.

Downtime and confusion

To give some idea of the scale of the outage, services impacted according to Silicon include some of the below::

  • Dish.com
  • The Dish Anywhere app
  • Boost Mobile
  • “Other websites and networks” operated and owned by DISH network.
  • The DISH call centre.

This is in addition to people not being able to pay bills or login. It’s not uncommon for a business to be rendered inoperable in the aftermath of a ransomware attack. However, it is somewhat unusual to see so many services fall over simultaneously. Perhaps the scale of the attack is something to behold, or maybe the attackers just got lucky. Either way, we won’t know for certain until the investigation is concluded and findings are published.

Bleeping Computer has been told by sources that the Black Blasta ransomware operation is allegedly behind the attack, “first breaching Boost Mobile and then the Dish corporate network”. It’s worth stressing that Bleeping Computer goes on to say that this information has not been independently, and DISH has not responded to multiple emails requesting more information. It’s possible we may be waiting some time for additional details to be made public.

Meanwhile, TechCrunch has been informed that employees have no information about the incident and have not been told when they can return to work. This is not a great situation for anyone involved, and really speaks to the scale of impact that a ransomware outbreak can have.

How bad is the current state of play?

Customers are without various services, and the Dish website is still sporting a “Thank you for your patience” message along with the link to a statement which includes the following message:

The security of our customers’ data is important to us, and if we learn that information was compromised, we’ll take the appropriate steps and let any impacted customers know.

As a result of this incident, many of our customers are having trouble reaching our service desks, accessing their accounts, and making payments. We’re making progress on the customer service front every day, including ramping up our call capacity, but it will take a little time before things are fully restored. DISH TV continues to operate and is up and running.

If you’re a DISH customer, you may have to wait a bit longer until things are something like approaching normal service.

How to avoid ransomware

  • Block common forms of entry. Create a plan for patching vulnerabilities in internet-facing systems quickly; disable or harden remote access like RDP and VPNs; use endpoint security software that can detect exploits and malware used to deliver ransomware.
  • Detect intrusions. Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use EDR or MDR to detect unusual activity before an attack occurs.
  • Stop malicious encryption. Deploy Endpoint Detection and Response software like Malwarebytes EDR that uses multiple different detection techniques to identify ransomware.
  • Create offsite, offline backups. Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly.
  • Write an incident response plan. The period after a ransomware attack can be chaotic. Make a plan that outlines how you’ll isolate an outbreak, communicate with stakeholders, and restore your systems.

Have a burning question or want to learn more about our cyberprotection? Get a free business trial below.

GET STARTED


[ad_2]
Source link

Samsung Galaxy S23 Ultra vs Xiaomi 13 Pro

0
[ad_1]

The Xiaomi 13 Pro launched globally during the Mobile World Congress 2023. The phone has a truly great camera setup, while Xiaomi also packed truly powerful specs on the inside. Comparing it to the best of Samsung definitely makes sense, for a number of reasons. So, in this article, we’ll compare the Samsung Galaxy S23 Ultra vs Xiaomi 13 Pro. These are two of the most powerful phones Samsung and Xiaomi have to offer at the moment.

The two phones are quite different design-wise, while their software iterations also differ. They do share some of the specs, though, but utilize completely different camera setups. There’s a lot to talk about here, actually. We’ll first list their specifications, and will then move to compare their designs, displays, performance, battery life, and camera performance.

Specs

Samsung Galaxy S23 UltraXiaomi 13 Pro
Screen size6.8-inch QHD+ Dynamic AMOLED 2X display (curved, 120Hz adaptive refresh rate, LTPO, down to 1Hz, 1,750 nits peak brightness)6.73-inch QHD+ LTPO AMOLED display (curved, 120Hz adaptive refresh rate, 1,900 nits peak brightness)
Screen resolution3080 x 14403200 x 1440
SoCQualcomm Snapdragon 8 Gen 2 for GalaxyQualcomm Snapdragon 8 Gen 2
RAM8GB/12GB (LPDDR5X)12GB (LPDDR5X)
Storage256GB/512GB/1TB, non-expandable (UFS 4.0)256GB/512GB, non-expandable (UFS 4.0)
Rear cameras200MP (f/1.7 aperture, 24mm lens, 0.6um pixel size, multi-directional PDAF, Laser AF, OIS)
12MP (ultrawide, Dual Pixel AF, 120-degree FoV, f/2.2 aperture, 1.4um pixel size)
10MP (telephoto, Dual Pixel AF, OIS, f/2.4 aperture, 1.12um pixel size, 70mm lens, optical zoom 3x)
10MP (telephoto, Dual Pixel AF, OIS, f/4.9 aperture, 1.22um pixel size, 230mm lens, 10x optical zoom, 100x Space Zoom)
50.3MP (Sony’s IMX989 1-inch sensor, f/1.9 aperture, 1.6um pixel size, Dual Pixel PDAF, OIS)
50MP (ultrawide, f/2.2 aperture, 14mm lens, 115-degree FoV)
50MP (telephoto, 3.2x optical zoom, f/2.0 aperture, PDAF)
Leica
Front cameras12MP (f/2.2 aperture, 26mm lens, Dual Pixel PDAF)32MP
Battery5,000mAh, non-removable, 45W wired charging, 15W Qi wireless charging, 4.5W Wireless PowerShare
Charger not included
4,820mAh, non-removable, 12W wired charging, 50W wireless charging, 10W reverse wireless charging
Charger included
Dimensions163.4 x 78.1 x 8.9mm162.9 x 74.6 x 8.7mm
Weight234 grams229 grams
Connectivity5G, LTE, NFC, Bluetooth 5.3, Wi-Fi, USB Type-C5G, LTE, NFC, Bluetooth 5.3, Wi-Fi, USB Type-C
SecurityIn-display fingerprint scanner (ultrasonic)In-display fingerprint scanner (optical)
OSAndroid 13
One UI 5.1
Android 13
MIUI 14
Price$1,199.99/$1,299/$1,399/TBA (1TB)€1,299/TBA
BuySamsungXiaomi

Samsung Galaxy S23 Ultra vs Xiaomi 13 Pro: Design

Both of these phones are made out of metal and glass, but they both look different, and feel different in the hand. The Galaxy S23 Ultra has flat top and bottom sides, while its sides are curved with a flattish feeling. It’s difficult to explain. The Xiaomi 13 Pro, on the other hand, has a more familiar design. It has two pieces of glass that curve towards the phone’s frame. Those glass panels on the front and back are only slightly curved towards the sides.

Both phones have a centered display camera hole, and very thin bezels. Both displays are curved, but only barely, neither company opted for a major curvature this time around. If we flip the two phones over, you’ll see entirely different-looking camera setups. The Galaxy S23 Ultra has four cameras on the back, each of which protrude from the backplate directly. The Xiaomi 13 Pro has a camera island in the top-left corner, which includes three cameras, covered by Leica lenses.

The Galaxy S23 Ultra is slightly taller, and considerably wider than the Xiaomi 13 Pro. It’s also slightly thicker. When it comes to thickness, they’re very close if you compare the Galaxy S23 Ultra with the ceramic variant of the Xiaomi 13 Pro, which is the only variant that got released globally. In China, there is a vegan leather model that is a bit lighter. Both phones feel truly premium in the hand, and both are IP68 certified for water and dust resistance. The in-hand feel is different, though, and the Galaxy S23 Ultra feels considerably larger when you hold it.

Samsung Galaxy S23 Ultra vs Xiaomi 13 Pro: Display

Both companies decided to include truly outstanding displays in their flagship devices. The Galaxy S23 Ultra includes a 6.8-inch QHD+ (3088 x 1440) Dynamic AMOLED 2X curved display. It has a 120Hz refresh rate, and supports HDR10+ content. This display gets up to 1,750 nits of peak brightness when needed. It is protected by the Gorilla Glass Victus 2, and it offers a pixel density of 500.

Samsung Galaxy S23 Ultra Review AM AH 07

The Xiaomi 13 Pro, on the other hand, has a 6.73-inch QHD+ (3200 x 1440) LTPO AMOLED display. This panel is also curved, and it can project up to 1 billion colors. It has a 120Hz refresh rate and Dolby Vision support. It also supports HDR10+ content, and can get truly bright at 1,900 nits. This display is protected by the Gorilla Glass Victus, and it has a pixel density of 522, in case you were wondering.

These two displays are some of the best in the market, easily. Not only are they truly vivid and offer those deep blacks, but they’re also very sharp. The viewing angles are outstanding, and they are also very fluid. On top of that, they have proper HDR10+ support, and get truly bright. The Xiaomi 13 Pro does technically get slightly brighter, but both are more than enough, even in direct sunlight. You really can’t miss, both displays are outstanding.

Samsung Galaxy S23 Ultra vs Xiaomi 13 Pro: Performance

The Galaxy S23 Ultra is fueled by the Snapdragon 8 Gen 2 for Galaxy SoC, while the Xiaomi 13 Pro comes with the Snapdragon 8 Gen 2. Both phones essentially have the same SoC, but the one in the Samsung phone is clocked a bit higher. In any case, both phones also include LPDDR5X RAM and UFS 4.0 flash storage. The Galaxy S23 Ultra has up to 12GB, while the Xiaomi 13 Pro comes with 12GB of RAM only, globally. Samsung offers up to 1TB of storage, while Xiaomi offers up to 512GB of storage. Both phones also ship with Android 13 out of the box, with their respective skins.

Both of these phones are immensely powerful on paper, there’s no denying that. And yes, that does translate to real-life use as well. These two phones are blazing fast in every way, shape and form. It really doesn’t make a difference what you’re doing on the device, and that even includes gaming. They can play any game from the Play Store without a hitch, at least the ones we tried out were running very smoothly. That even goes for the most demanding titles out there, Genshin Impact ran perfectly fine. Qualcomm made an outstanding SoC, and One UI 5.1 and MIUI 14 are apparently running great on the platform. You really don’t have to worry about performance, at least as things stand at the moment.

Samsung Galaxy S23 Ultra vs Xiaomi 13 Pro: Battery

The Samsung Galaxy S23 Ultra comes with a 5,000mAh battery, while the Xiaomi 13 Pro has a 4,820mAh battery on the inside. That, combined with their software, and the Snapdragon 8 Gen 2, which is excellent in the power consumption segment… delivers great battery life on both phones. Now, in our testing, the Galaxy S23 Ultra can last a bit longer, but the Xiaomi 13 Pro offers excellent battery life as well.

We were able to get up to 9-10 hours of screen-on-time with the Galaxy S23 Ultra, more often than not. If you’re not doing anything power-demanding, it may even go a bit further than that. The Xiaomi 13 Pro, on the other hand, is also able to go the distance. I was ending my days with around 7 hours of screen-on-time during the review, but I had a lot of battery life left. I once pushed it past the 8-hour screen-on-time mark and it was still going. Do note that I don’t really play games on my phones, though, only for testing purposes. So, gaming, and other demanding tasks may show different results. There are also a number of other factors that may affect battery life differently for you, of course.

Now, when it comes to charging, the Xiaomi 13 Pro obliterates the Galaxy S23 Ultra, basically. Not only does it come with a charger unlike the Galaxy S23 Ultra, but it packs in a 120W charger. The Xiaomi 13 Pro supports 120W wired, 50W wireless, and 10W reverse wireless charging. The Galaxy S23 Ultra, on the other hand, offers 45W wired, 15W wireless, and 4.5W reverse wireless charging. The Xiaomi 13 Pro charges considerably faster in all three aspects.

Samsung Galaxy S23 Ultra vs Xiaomi 13 Pro: Cameras

These two devices have immensely different camera setups, and do produce different results too. The Galaxy S23 Ultra comes with a 200-megapixel main camera, a 12-megapixel ultrawide camera (120-degree FoV), a 10-megapixel telephoto unit (3x optical zoom), and a 10-megapixel periscope telephoto camera (10x optical zoom, 100x Space Zoom). The Xiaomi 13 Pro, on the flip side, has a 50.3-megapixel main camera (1-inch sensor), a 50-megapixel ultrawide camera (115-degree FoV), and a 50-megapixel telephoto camera (3.2x optical zoom). Leica lenses are also used on top of all three Xiaomi cameras.

AH Xiaomi 13 Pro KL image 22

Both phones do excel in the camera department, though neither is perfect. The Galaxy S23 Ultra can produce outstanding shots in all scenarios, when it nails a shot. Samsung still has to work on consistency a bit at this point, but the cameras here produce outstanding results. It is capable of balancing even the most demanding shots. Like the ones at night with plenty of lights and neon signs. It also offers great dynamic range, when it hits it right. The pictures are usually spot on, but at times it can tune up the saturation a bit too high.

The Xiaomi 13 Pro produces a bit moodier shots, which is especially noticeable in ‘Leica Authentic’ mode, and during the night. That’s not a bad thing, as the whole point is for the photos to be a bit more Leica-like. There are also a ton of Leica shooting styles you can choose from. The Xiaomi 13 Pro does a great job overall, except for some HDR situations, it still tends to miss those during both day and night, at times. Well, at least it did during our review, but that is easily fixable. The Xiaomi 13 Pro truly shins in portrait photography with its telephoto camera, it yields outstanding results. Its 1-inch camera produces great shots as well, with creamy bokeh, it really can capture a breathtaking image.

Ultrawide cameras on both phones are really good and keep up the pace with the main shooter. The video recording is also good on both phones, but the Galaxy S23 Ultra does stand out. It offers better stabilization, and the end results usually look a bit better. Both smartphones are truly great in the camera department, though, I cannot emphasize that enough.

Audio

Both smartphones have stereo speakers built-in, and both phones produce really good audio. The audio is more than loud enough, while there’s also some bass in there. The distortion is not noticeable, and they are overall well-balanced.

Having said that, neither of these two phones has an audio jack. You’ll have to use the Type-C ports in case you want to connect your headphones via a wire. If you prefer a wireless connection, there’s always Bluetooth 5.3, which is supported by both phones.


[ad_2]
Source link

TikTok sets 60 minute screen time limit for teens

0
[ad_1]

Over the past few years, TikTok has exploded in popularity, with children reportedly spending an average of 91 minutes on the platform. This has raised concerns among parents, who fear that excessive screen time may harm their children’s mental health and well-being. To address these concerns, TikTok has recently introduced new features aimed at reducing teenagers’ screen time and providing parents with more control over their children’s activities on the app.

Under this change, users under 18 years will have a daily screen time limit of 60 minutes. In case the user wants to extend the screen time limit, they will have to enter a passcode, thus “requiring them to make an active decision to extend that time,” says TikTok. Additionally, if a teenager disables the screen time limit, the company will prompt them to set a limit if they spend over 100 minutes on the app. TikTok will also send younger users an inbox notification each week recapping their screen time.

Although TikTok consulted with experts from the Digital Wellness Lab at Boston Children’s Hospital and reviewed academic research to determine the limits, there is no universally accepted standard for how much screen time is excessive. Therefore with these changes, the company hopes to provide teenagers with the extra support they need “as they start to explore the online world independently.”

Family Pairing

Besides the screen limit, TikTok is introducing a new Family Pairing feature aimed at giving parents the ability to monitor their child’s activity on TikTok. Under the new parental controls, parents can apply custom limits that adjust based on the day of the week or school holiday. They also get access to TikTok’s screen time dashboard, which summarizes a child’s app usage and provides a breakdown of how much time they spent during the day and night, and mute app notifications on their children’s accounts based on a schedule they set. Additionally, the company is also developing content controls, which allow parents to filter out specific videos based on certain hashtags or words.

Apart from the Family pairing feature, TikTok plans to roll out some of these changes to all users, allowing them to schedule mute notifications and set customized screen time limits for each day of the week. These changes will provide users with more control over their app usage and help them manage their time more effectively.


[ad_2]
Source link

Americans are desperate to remove this popular app from their phones and tablets

0
[ad_1]
Privacy experts VPNOverview wanted to find out which popular apps Americans wanted to get rid of the most. So for each of the 50 states, it looked up regional search volume for “delete” and “deactivate” apps. With help from web analytics company Similarweb, VPNOverview also analyzed the number of active users and downloads for each Android app over the last year. The result? A list of the 10 most popular apps that Americans want to delete the most.
The app that had the most searches for deletion in the U.S. was Instagram with 900,120 searches coast-to-coast. The app has seen a 25% decline in installs over the last six months. Instagram’s stable-mate Facebook was next with 385,410 search requests related to finding out how one would get rid of the app on a phone or tablet. The number of downloads has decreased by 22% over the last six months.
With search volume of 217,400 queries asking how to 86 the app. Snapchat was third with users in New Mexico and Arizona the most eager to get rid of the app. Twitter was fourth on the list (92,490 deletion search requests). Those in California, Maryland, Nevada, and Washington are most interested in getting rid of the social media app.

With 24,810 searches looking for information on deleting the app, messaging service Telegram was fifth on the list with those in New Jersey especially anxious to get the app off of their devices.

The rest of the top 10 popular apps that America most wants to wipe off their mobile devices include:

6. Spotify (14,560 searches)

7. TikTok (14,120 searches)

8. LinkedIn (8,540 searches)

9. Tinder (7,980 searches)

Number 10 is a surprise as 6,720 searches were discovered by Americans looking to delete video streamer YouTube. With over 10 billion downloads on Android alone, the number of search requests seeking a way to remove YouTube from a phone or tablet is quite a small percentage.

Christopher Bluvshtein, a Privacy expert at VPNOverview, said, “Some people are also turning their backs on social media altogether. Whether due to politics, increasing cybersecurity issues, or even insecurity over those in a more fortunate position, there’s clearly been an increasing trend of people leaving these applications behind. People are burning out. Recently, an interesting term came about known as ‘’doom-scrolling’’ Essentially, this refers to spending excess time online reading negative news. There are a lot of problems in the world right now, and this kind of endless negativity can wear you down over time, so this could easily be contributing to the phenomenon.”


[ad_2]
Source link

Chromium Flaw Allowed SameSite Cookie Bypass On Android

0
[ad_1]

A researcher discovered a severe vulnerability in Chromium that allowed SameSite cookie bypass on Android browsers. Google patched the flaw following the bug report.

Chromium SameSite Cookie Bypass Vulnerability

Security researcher Axel Chong discovered and reported a SameSite cookie bypass vulnerability affecting Chromium Android browsers.

According to the bug report, Chong found that he could evade the SameSite cookie restriction on Android browsers using the Intent scheme for site navigation.

Possible to bypass SameSite cookie on Android by redirecting to Intent and continuing to stay in Chrome.

Chong also shared the steps for reproducing the vulnerability, demonstrating the bypass that could allow evading SameSite cookie restriction.

Commenting about his findings with The Daily Swig, the researcher explained that he noticed the vulnerability when working on Intents. He wondered how Intent URLs could allow security bypass while elaborating that this vulnerability could also lead to cross-site request forgery (CSRF).

The discussion on Chong’s bug report also highlighted that Chrome had previously fixed a similar issue, where normal redirects also passed SameSite cookies. However, he could still observe this behavior, which suggested that Chrome somehow disabled it at some point.

Google Fixed The Vulnerability

Chong reported this issue to Google in September 2022, triggering much discussion. It was difficult for the developers to address this problem since it required determining trusted apps since Android’s security model didn’t reveal the sender of an Intent.

The comments on the bug report indicate how trusting incoming Intents for all apps could allow SameSite restriction bypasses for all apps. Hence, after a thorough discussion, the developers eventually decided to disallow SameSite cookies for untrusted apps.

The researcher also tested and confirmed the fix deployed with 109.0.5397.0 Android Chrome Canary in November 2022. Afterward, the developers took some time to address the same issue for custom tabs before allowing bug disclosure.

Besides deploying the patch, Google rewarded the researcher with a $5000 bounty according to the Vulnerability Reward Program.

Let us know your thoughts in the comments


[ad_2]
Source link

Internet Explorer users still targeted by RIG exploit kit

0
[ad_1]

The RIG Exploit Kit is one of the last major exploit kits that still targets the legacy Internet Explorer browser.

Despite a very slim browser market share, Internet Explorer (IE) is still being exploited by exploit kits like the RIG exploit kit (EK).

One major advantage for the malware distributors behind the exploit kit is that the outdated browser has reached end-of-life (EOL), which means it no longer receives security updates and patches against known threats.

According to Malwarebytes’ Senior Director of Threat Intelligence Jérôme Segura:

“RIG EK is probably one of the last exploit kits targeting Internet Explorer still around. We have observed RIG EK activity via the same malvertising campaigns for the past several years.”

An exploit kit is a toolkit designed to facilitate the exploitation of client-side vulnerabilities most commonly found in browsers and their plugins in order to deliver malware. The primary infection method with an exploit kit is a drive-by download attack, when cybercriminals lure potential victims to a site where their browser can be fingerprinted and vulnerabilities can be unleashed to infect the system. Ideally for the exploit kit handler, such attacks occur silently within seconds and they do not require any user interaction.

A recent report by Prodaft details a wealth of information related to the victim statistics, operation, command and control (C&C) server, and technical aspects of RIG EK.

RIG EK has been around since 2014 and, despite many take down efforts, has always managed to make a comeback. Without many changes to the inner workings of the exploit kit itself, we’ve seen many changes in the malware distributed. It all depends on which cybercriminals pay the RIG EK administrator to install their malware on victim machines. RIG EK has also introduced some newer vulnerabilities while Internet Explorer’s market share has continued to drop.

Prodaft researchers describe how they noticed RIG EK RIG dropping multiple types of malware, including stealers, Remote Access Trojans (RATs), cryptocurrency miners, and banking malware. The exploits of RIG EK are delivered to unsuspecting victims in two ways: either via malvertising, where users are redirected to online advertising pages that are tricked to execute the RIG exploits on their browser; or when the victim visits sites that were compromised and the exploit kit’s JavaScript was injected.

As Jérôme mentions, at Malwarebytes we’ve seen them involved via the same malvertising campaigns for the past several years.

November 2020 Fiddler analysis

2020 analysis of malvertising leading to the RIG Exploit Kit

We connected some RIG EK activity with the cybercriminal behind the “MakeMoney gate” (a name coined by security researcher @nao_sec) based on the domain makemoneywithus[.]work (188.225.75.54) with the earliest instance of this threat group seen in December 2019 via the gate gettime[.]xyz (185.220.35.26).

We still see some hits every week, but nothing to make this exploit kit a real threat anymore. We should note that the threat actor behind the MakeMoney gate tried the social engineering route in 2022, using a fake browser update campaign which was not all that different from the one we saw with SocGholish.

February 2023 analysis

Very recently recorded malvertising campaign

Mitigation

The main advice to stay out of the claws of exploit kits is clear. Use a fully updated and patched browser. And always be careful before you click on links.

A warning from Jérôme Segura:

“We can expect RIG EK to stick around to the very end until there is no one left behind to infect. The individual(s) behind the malvertising campaigns have been persistent and still count on victims daring enough to visit shady websites with an outdated computer.”

Have a burning question or want to learn more about our cyberprotection? Get a free business trial below.

GET STARTED


[ad_2]
Source link

New Continuity Features Could Come to Apple’s Extended Reality

0
[ad_1]

VR headset Unsplash

A recent patent suggests that Apple could bring new Continuity features to its forthcoming mixed-reality headset. 

Apple uses the term “Continuity” to describe how its devices interact seamlessly within the ecosystem. 

For example, Handoff allows iPhone users to switch to another nearby Apple device and pick up from the exact app they left off. Similarly, the Continuity camera allows macOS Ventura (or later) users to substitute an iPhone’s camera for the webcam. 

There are several other Continuity features within the Apple ecosystem, such as: 

  •  AirPlay to Mac
  • Auto Unlock and Approve with Apple Watch”
  • Universal Control
  • Universal Clipboard
  • Continuity Markup
  • Continuity Sketch
  • Sidecar

Yes, the list is quite long — but it could grow even longer soon. 

Last week, the European Patent Office published Apple’s recent patent application titled “Multi-Device Continuity for use with Extended Reality (XR) Systems.” The document shows how Continuity functions between an XR headset and other Apple devices might work. 

Here’s a breakdown. 

Continuity Operations Between Extended Reality and Other Apple Devices

In the first scenario, a headset wearer looks over at an email on an iPhone screen, which also includes a virtual replica of the Mail app’s interface. Then the user can transfer the email to a larger virtual display suspended in an environment using a hand gesture or gaze switch. 

Another scenario involves users switching songs playing on the iPhone’s media app to the HomePod with just a gaze. That means you won’t need to approach the smart speaker to transfer the music— you only need to look at it. 

“This handoff logic can be via a direct peer-to-peer connection and/or facilitated by a cloud server,” note the patent authors.

The patent includes several other scenarios that show the XR headset “managing continuous transfer of control between other devices in the system responsive to three-dimensional location-based user inputs, and/or… one or more of the other devices and the device itself.”

The number of Continuity features expected from Apple’s forthcoming XR headset is unclear. However, a recent report from Bloomberg’s Mark Gurman suggests that the headset could launch at WWDC in June. 

So there’s time to learn more about the device. 


[ad_2]
Source link

Samsung treats Galaxy A53 5G users in the US with One UI 5.1

0
[ad_1]

Galaxy A53 5G users in the US, we have good news for you. Samsung‘s One UI 5.1 update is available for your phone. The rollout began recently for Verizon customers, at least. The company should soon cover all Galaxy A53 5G units stateside with the latest version of One UI.

One UI 5.1 is rolling out to the Galaxy A53 5G in the US

The One UI 5.1 update for users on Verizon’s network is rolling out with the firmware build number A536VSQU4CWB2. It brings the February security patch along with all the goodies that are part and parcel of the latest One UI version (more on that later). The update will reach both carrier-locked and unlocked Galaxy A53 5G users on other networks in the coming days. As usual, the firmware version may vary, but rest assured that you will not miss out on any goodies.

Coming to the content of the update, the premium mid-range smartphone from Samsung is getting more than 50 vulnerability fixes with this release. At least five patches that the company pushed with the February SMR (Security Maintenance Release) were critical issues. Google said some of those could lead to remote code execution, potentially allowing threat actors to remotely gain control of your phone. The latest update blocks that.

Along with these essential security enhancements, Samsung is also pushing a host of new features to the Galaxy A53 5G. For starters, resizing pop-up windows is now easier, and you can now select from the most used apps and recent apps when entering split-screen mode. GIF remaster makes blurry GIFs a thing of the past on your Galaxy smartphone. With One UI 5.1, you can also extract text from videos. Samsung has improved widgets to give you more information at a glance.

Elsewhere, Bixby Text Call now supports English. Open the Phone app on your phone and go to More options (three dots) > Settings > Bixby text call. Now turn it on to get live transcriptions of audio calls on your screen. There are also many subtle improvements for wallpapers, AR Emoji, and other system apps. Overall, the One UI 5.1 update will let you get more out of your Galaxy A53 5G smartphone.

Update your Galaxy smartphone to get these new features

The One UI 5.1 update will be available to all Galaxy A53 5G users in the US over the next few days. To check for updates, go to Settings > Software update and tap on Download and install. Your phone will now search for available updates and prompt you to download them if it finds any. If there’s no update available today, wait a few days and repeat the steps. You may also get a notification once the update becomes available for your Galaxy A53 5G.


[ad_2]
Source link

Building the Pixel Watch was actually quite cheap

0
[ad_1]

The Google Pixel was given some flack for being a quite expensive product compared to the other watches on the market. The LTE model of the watch will set you back $399. According to a report from CounterPoint, however, the cost to build a Pixel Watch is actually pretty low.

Anyone should know that it costs money to build the products that we use every day. The cost it incurs to build the product has an effect on the final price that you pay when you check out. With the price of tech going up, it will definitely surprise a lot of people how much it costs to make their favorite devices.

The cost to build a Pixel Watch is relatively low

The Pixel Watch, as great of a smartwatch as it is, is not cheap. You’re paying a premium price for it. So, how much does Google have to shell out to build one? Well, according to the report, it costs about $123 to manufacture an LTE Pixel Watch. So, you’re paying about 2.25 times the manufacturing cost for the watch itself.

This is to be expected, as there’s always a big gap between the manufacturing cost and the final price. So, $123 of what you pay goes to offset the manufacturing cost and the rest goes into the company. As you can imagine, R&D, building, marketing, and paying employees for the Pixel watch is rather expensive, so this is one of the reasons for the high price tag.

Also, even though the watch is rather expensive, we’re not quite sure that Google is even making a profit off of the product. The company needs to sell a lot of them to effectively recuperate the cost of building the watch. So, it’s likely that the company is still operating at a loss.

Looking at the graph, the processor and RAM chips were the biggest cost. It made up 26.9% of the cost. The display came in second place at 17.2% of the cost and third place belongs to the casing, waterproofing, and thermal treating at 14.7%.

pixel watch cost graph

If you’re looking to buy one of these devices, you can take a look at our review of it below. It comes in two variants. One is a Wi-Fi-only version and the other one uses LTE.

Pixel Watch Review

 


[ad_2]
Source link