Novel attack against virtually all VPN apps neuters their entire purpose
Novel attack against virtually all VPN apps neuters their entire purpose
https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/
TunnelVision vulnerability has existed since 2002 and may already be known to attackers.
cross-posted from: https://lemmy.ml/post/15178977
FWIW, this isn't to do with me personally at all, I'm not looking to do anything dodgy here, but this came up as a theoretical question about remote work and geographical security, and I realised I didn't know enough about this (as an infosec noob)
Presuming:
- an employer provides the employee with their laptop
- with security software installed that enables snooping and wiping etc and,
- said employer does not want their employee to work remotely from within some undesirable geographical locations
How hard would it be for the employee to fool their employer and work from an undesirable location?
I personally figured that it's rather plausible. Use a personal VPN configured on a personal router and then manually switch off wifi, bluetooth and automatic time zone detection. I'd presume latency analysis could be used to some extent?? But also figure two VPNs, where the second one is that provided by/for the employer, would disrupt that enough depending on the geographies involved?
What else could be done on the laptop itself? Surreptitiously turn on wiki and scan? Can there be secret GPSs? Genuinely curious!
Stealing your Telegram account in 10 seconds flat
Stealing your Telegram account in 10 seconds flat
https://lyra.horse/blog/2024/05/stealing-your-telegram-account-in-10-seconds-flat/
Say you handed me your phone, what’s the worst I could do in 10 seconds?
Computer scientists unveil novel attacks on cybersecurity
Computer scientists unveil novel attacks on cybersecurity
https://www.sciencedaily.com/releases/2024/04/240426165229.htm
Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use.
Passkeys: A Shattered Dream
Firstyear's blog-a-log
https://fy.blackhats.net.au/blog/2024-04-26-passkeys-a-shattered-dream/
Firstyear's blog
After XZ Utils, More Open-Source Maintainers Under Attack
After XZ Utils, More Open-Source Maintainers Under Attack
https://www.bankinfosecurity.com/after-xz-utils-more-open-source-maintainers-under-attack-a-24870
Major open-source software projects are warning that more pieces of code than XZ Utils may have been backdoored by attackers, based on ongoing supply-chain attack
PuTTY priority high vulnerability CVE-2024-31497
Simon Tatham (@simontatham@hachyderm.io)
https://hachyderm.io/@simontatham/112276855758487211
We've released #PuTTY version 0.81. This is a SECURITY UPDATE, fixing a #vulnerability in ECDSA signing for #SSH. If you've used a 521-bit ECDSA key (ecdsa-sha2-nistp521) with any previous version of PuTTY, consider it compromised! Generate a new key pair, and remove the old public key from authorized_keys files. Other key types are not affected, even other sizes of ECDSA. In particular, Ed25519 is fine. This vulnerability has id CVE-2024-31497. Full information is at https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html
New Technique Detected in an Open Source Supply Chain Attack
New Technique Detected in an Open Source Supply Chain Attack
https://checkmarx.com/blog/new-technique-to-trick-developers-detected-in-an-open-source-supply-chain-attack/
In a recent attack campaign, cybercriminals were discovered cleverly manipulating GitHub's search functionality, and using meticulously crafted repositories to distribute malware.
New Spectre v2 attack impacts Linux systems on Intel CPUs
New Spectre v2 attack impacts Linux systems on Intel CPUs
https://www.bleepingcomputer.com/news/security/new-spectre-v2-attack-impacts-linux-systems-on-intel-cpus/
Researchers have demonstrated the "first native Spectre v2 exploit" for a new speculative execution side-channel flaw that impacts Linux systems running on many modern Intel processors.