Copy
~this week in security~
a cybersecurity newsletter by @zackwhittaker

volume 3, issue 10
 

THIS WEEK, TL;DR

Five years of Intel CPUs and chipsets have an unfixable flaw
Ars Technica: Virtually every Intel chip from the past five years has a concerning, unfixable flaw, which now patched makes it harder but not impossible to exploit. The problem is found in a security subsystem of the chip, known as CSME, which is part of Intel's root of trust. Without that, there's no guarantee that an affected computer hasn't been compromised at the hardware level.
More: Positive Technologies | The Register | @profwoodward

Through apps, not warrants, 'Locate X' allows feds to track phones
Protocol: Babel Street, a little-known surveillance company, has big contracts with the federal government. It claims it can allow investigators to "draw a digital fence around an address or area, pinpoint mobile devices that were within that area, and see where else those devices have traveled, going back months," according to the publication. It uses data collected from a range of apps, which are sold on to data brokers. Privacy advocates said people are "generally unaware" of how far their personal information could travel, or that it could be used by the feds — like ICE and CBP — without a warrant.
More: @levinsonc tweets
US threatens to pull big tech’s immunities if child abuse isn't curbed
TechCrunch: This week, the DOJ and its Five Eyes partners rolled out 11 "voluntary" principles for tech giants to combat online child sex abuse. What the DOJ didn't mention was that behind the scenes, lawmakers were passing out draft bills to put those same principles into law. If tech companies fail to meet the lawmakers' standards, they could have their Section 230 provisions revoked — essentially the powers that give tech companies immunity for what their users say on their platforms. Critics say Section 230 keeps the internet alive, and that the bill is a "direct attack" on encryption, which some say was the goal all along. (Disclosure: I co-bylined this story.)
More: Senate Judiciary Committee | The New York Times ($) | Cryptography Engineering

Accused LinkedIn hacker worked with alleged SEC hacker, DOJ accuses
Cyberscoop: Yevgeniy Nikulin, a Russian hacker who allegedly stole 117 million usernames and passwords from LinkedIn, Dropbox, and Formspring in 2012, was allegedly in regular contact with Oleksandr Ieremenko, a Ukrainian charged with allegedly breaking into the U.S. Securities and Exchange Commission, prosecutors now allege. Nikulin is set to stand trial in San Francisco. Prosecutors called the hackers part of a "criminal clique."
More: Justice Dept. | SEC

An Android app with 1 billion downloads is recording users' web browsing
Forbes ($): This week @iblametom reported on an app, Clean Master, a security tool developed by Cheetah Mobile, which was evicted from Google's app store. Turns out it was recording users' web browsing activity, including incognito browsing sessions. Avast and Trend Micro were previously caught pulling the same stunts.
Archive: Malwarebytes

Contacts of 1 million Virgin Media customers left on unsecured database
The Guardian: A security researcher found an exposed database and reported it to Virgin Media, which secured and disclosed the incident. What Virgin Media didn't say was that about 1,100 customers had their accounts linked to porn or other adult sites. That GDPR fine will be huge.
More: BBC News | @thisisFoxx
~ ~
SUPPORT THIS NEWSLETTER

A big thank you to everyone who reads and supports this newsletter! As subscribers go up, so do the monthly costs. Please spare $1/month (or more for exclusive perks like stickers and mugs) to help maintain the upkeep of this newsletter. You can contribute to the Patreon here!
~ ~

THE STUFF YOU MIGHT'VE MISSED

WireGuard gives Linux a faster, more secure VPN
Wired ($): Good news for Linux users: while most security folks are wary of VPNs for their varied (and often lacking) security, WireGuard has long been seen as the gold standard for open-source VPN software. WireGuard will soon be part of the Linux kernel. The software is expected to be fully rolled into the Linux code in the coming weeks.

A psychiatrist fights the cyber industry's mental health stigma — and appeals for help
Cyberscoop: Really glad this story was published this week. @snlyngaas did a great job here: a psychiatrist is calling on security professionals to put stigma to one side and talk more about their mental health. Some 91% of all CISOs recently surveyed reported moderate to high stress, with one-quarter saying their jobs have harmed their mental or physical health. A really important topic, and one we all need to do more to help one another.

Let's Encrypt bug forces revocation of some certificates
Ars Technica: Let's Encrypt just celebrated 1 billion issued certificates, but this week it acknowledged a bug in its certificate authority authorization code, forcing the non-profit to revoke some 3 million certificates. In a blog post, Let's Encrypt said users should've renewed their certificates by March 4 or their sites would report security errors.

iOS, macOS bug let hackers remotely dump memory
Google Project Zero: A little zero-day to finish out the week. The bug, first discovered by Project Zero's @i41nbeer, shows how a hacker can remotely dump the memory of iPhones and Macs. Apple has fixed the bugs.
~ ~

OTHER NEWSY NUGGETS

This small company has turned Utah into a surveillance panopticon
Banjo is a small company in Utah, which combines AI with data collected from social media, satellites and other apps to "detect anomalies" in the real world. The idea is that the system can alert law enforcement to crimes as the happen. But the company has little to no oversight and has managed to secure several major contracts with Utah state government departments. How is that any different from Palantir, you might ask? "We essentially do most of what Palantir does, we just do it live," said Banjo's top lobbyist. As usual, @josephfcox has a good tweet thread on the story.
Google tracked his bike ride past a burglarized home. That made him a suspect.
You've heard of reverse location warrants before — they're frequently mentioned in this newsletter. Police give Google (or any major location data collector) a set of geolocation coordinates and a timeframe, and anyone in that grid will have their information vacuumed up as part of that legal demand. NBC News reports on a case of a guy who almost got accused of crime he didn't commit — simply because he was caught in one of these dragnets. Welcome to our (dystopian) future.

Facebook sues Namecheap for its private-domain service
Facebook has sued Namecheap, which owns Whoisguard, a service used for privately registering domain names. Facebook's short blog post said that hackers had registered 45 domains through Whoisguard, which were designed to impersonate Facebook, but Nominet "declined to cooperate" in taking them down.

Defense contractor, SpaceX and Tesla parts maker among those hit by ransomware
This week was a busy week for ransomware. Visser, a parts maker for SpaceX and Tesla, was hit by the DoppelPaymer ransomware, which resulted in some files being published online after it refused to pay the ransom. Legal services giant Epiq Global was also hit, reportedly by Ryuk. Defense contractor CPI is still recovering some two months after its ransomware attack, and one of Roman Abramovich's companies, mining giant Evraz, was also briefly knocked offline by Ryuk. Meanwhile, Grayson County in Texas and LaSalle County in Illinois also saw interruptions from file-encrypting malware.
~ ~

THE HAPPY CORNER

Just one thing in the happy corner this week.

Turns out, @troyhunt isn't selling Have I Been Pwned after all. In a blog post, Hunt explained the reasoning. "I will continue running it independently," he wrote. "After 11 months of a very intensive process culminating in many months of exclusivity with a party I believed would ultimately be the purchaser of the service, unexpected changes to their business model made the deal infeasible."

And one small bonus nugget: if you thought your passwords were bad, turns out the CIA's password for its secret hacking tools is simply: 123ABCdef. Good to know.
If you want to nominate some good news from the week, feel free to reach out.
~ ~

THIS WEEK'S CYBER CAT

Meet Goose, this week's cybercat. According to his human, Goose is learning to code, but he’s struggling with his lack of opposable thumbs. Classic cat problem! A big thanks to Katherine Bingham for the submission. 
Please keep sending in your cybercats! You can send them here
~ ~

SUGGESTION BOX

That's all I have for you this week. Thanks for reading and subscribing. If you have any thoughts or feedback, please drop me a note in the suggestion box. Have a great week. See you Sunday.

You can update your preferences or unsubscribe from this list.