MINIX: Intel’s Hidden In-chip Operating System

Steven J. Vaughan-Nichols, writing for ZDNet: Matthew Garrett, the well-known Linux and security developer who works for Google, explained recently that, “Intel chipsets for some years have included a Management Engine [ME], a small microprocessor that runs independently of the main CPU and operating system. Various pieces of software run on the ME, ranging from code to handle media DRM to an implementation of a TPM. AMT [Active Management Technology] is another piece of software running on the ME.” At a presentation at Embedded Linux Conference Europe, Ronald Minnich, a Google software engineer reported that systems using Intel chips that have AMT, are running MINIX. So, what’s it doing in Intel chips? A lot. These processors are running a closed-source variation of the open-source MINIX 3. We don’t know exactly what version or how it’s been modified since we don’t have the source code. In addition, thanks to Minnich and his fellow researchers’ work, MINIX is running on three separate x86 cores on modern chips. There, it’s running: TCP/IP networking stacks (4 and 6), file systems, drivers (disk, net, USB, mouse), web servers. MINIX also has access to your passwords. It can also reimage your computer’s firmware even if it’s powered off. Let me repeat that. If your computer is “off” but still plugged in, MINIX can still potentially change your computer’s fundamental settings. And, for even more fun, it “can implement self-modifying code that can persist across power cycles.” So, if an exploit happens here, even if you unplug your server in one last desperate attempt to save it, the attack will still be there waiting for you when you plug it back in. How? MINIX can do all this because it runs at a fundamentally lower level. According to Minnich, “there are big giant holes that people can drive exploits through.” He continued, “Are you scared yet? If you’re not scared yet, maybe I didn’t explain it very well, because I sure am scared.” Also read: Andrew S. Tanenbaum’s (a professor of Computer Science at Vrije Universiteit) open letter to Intel. Read more of this story at Slashdot.

View original post here:
MINIX: Intel’s Hidden In-chip Operating System

Justice Department Demands Five Twitter Users’ Personal Info Over an Emoji

An anonymous reader quotes a report from Techdirt: Back in May, the Justice Department — apparently lacking anything better to do with its time — sent a subpoena to Twitter, demanding a whole bunch of information on five Twitter users, including a few names that regular Techdirt readers may be familiar with. If you can’t see that, it’s a subpoena asking for information on the following five Twitter users: @dawg8u (“Mike Honcho”), @abtnatural (“Virgil”), @Popehat (Ken White), @associatesmind (Keith Lee) and @PogoWasRight (Dissent Doe). I’m pretty sure we’ve talked about three of those five in previous Techdirt posts. Either way, they’re folks who are quite active in legal/privacy issues on Twitter. And what info does the DOJ want on them? Well, basically everything: [users’ names, addresses, IP addresses associated with their time on Twitter, phone numbers and credit card or bank account numbers.] That’s a fair bit of information. Why the hell would the DOJ want all that? Would you believe it appears to be over a single tweet from someone to each of those five individuals that consists entirely of a smiley face? I wish I was kidding. Here’s the tweet and then I’ll get into the somewhat convoluted back story. The tweet is up as I write this, but here’s a screenshot in case it disappears. The Department of Justice’s subpoena is intended to address allegations that Shafer, who has a history of spotting weak encryption and drawing attention to it, cyberstalked an FBI agent after the agency raided his home. Vanity Fair summarizes the incident: “In 2013, Shafer discovered that FairCom’s data-encryption package had actually exposed a dentist’s office to data theft. An F.T.C. settlement later validated Shafer’s reporting, but in 2016, when another dentist’s office responded to Shafer’s disclosure by claiming he’d violated the Computer Fraud and Abuse Act and broken the law, the F.B.I. raided his home and confiscated many of his electronics. Shafer was particularly annoyed at F.B.I. Special Agent Nathan Hopp, who helped to conduct the raid, and who was later involved in a different case: in March, he compiled a criminal complaint involving the F.B.I.’s arrest of a troll for tweeting a flashing GIF at journalist Kurt Eichenwald, who is epileptic. Shafer began to compile publicly available information about Hopp, sharing his findings on Twitter. The Twitter users named in the subpoena had started a separate discussion about Hopp, with one user calling Hopp the “least busy F.B.I. agent of all time, ” a claim that prompted Shafer’s smiley-faced tweet.” Read more of this story at Slashdot.

Read the article:
Justice Department Demands Five Twitter Users’ Personal Info Over an Emoji

Hyatt Hotels Discovers Card Data Breach At 41 Properties Across 11 Countries

Hyatt Hotels has suffered a second card data breach in two years. In the first breach, hackers had gained access to credit card systems at 250 properties in 50 different countries. This time, the breach appears to have impacted 41 properties across 11 countries. Krebs on Security reports: Hyatt said its cyber security team discovered signs of unauthorized access to payment card information from cards manually entered or swiped at the front desk of certain Hyatt-managed locations between March 18, 2017 and July 2, 2017. “Upon discovery, we launched a comprehensive investigation to understand what happened and how this occurred, which included engaging leading third-party experts, payment card networks and authorities, ” the company said in a statement. “Hyatt’s layers of defense and other cybersecurity measures helped to identify and resolve the issue. While this incident affects a small percentage of total payment cards used at the affected hotels during the at-risk dates.” The hotel chain said the incident affected payment card information — cardholder name, card number, expiration date and internal verification code — from cards manually entered or swiped at the front desk of certain Hyatt-managed locations. It added there is no indication that any other information was involved. Read more of this story at Slashdot.

Continue Reading:
Hyatt Hotels Discovers Card Data Breach At 41 Properties Across 11 Countries

This Guy Is Digitizing the VHS History of Video Games

An anonymous reader shares a report: UK-based gaming journalist and blogger Chris Scullion is on a mission to preserve his collection — and maybe your collection, too — of these old video game VHS tapes. In the 80s and 90s, video game companies and trade magazines made these tapes to accompany popular titles or new issues with bonus material or promotional footage, giving a glimpse into how marketing for games was done in the industry’s early days. Scullion has 18 tapes to upload so far, and plans to provide accompanying commentary as well as the raw video as they go up on his YouTube channel. Scullion’s first upload is a promotional tape for Super Mario All-Stars, given away by Nintendo UK in 1993. It’s hosted by Craig Charles, who played Lister in the British sci-fi sitcom Red Dwarf. Digitizing his collection keeps that sweet nostalgia content safe from degradation of the magnetic tape, which starts to go downhill within 10 to 25 years. He’s capturing them in HD using a 1080p upscaler, at a full 50fps frame rate by converting to HDMI before grabbing — a higher frame rate than many standard commercial digitizing devices that capture at 30fps — so that no frames are missed. Some of the tapes he’s planning to digitize have already been converted and uploaded to YouTube by other people, he says, but most are either poor quality or captured with less-advanced grabbing devices. Read more of this story at Slashdot.

View article:
This Guy Is Digitizing the VHS History of Video Games

Linux Desktop Market Share Crosses 3%

Data for the month of August 2017 from reliable market analytics firm Net Applications is here, and it suggests that Linux has finally surpassed the three percent mark, quite possibly for the first time in recent years. According to Net Applications, the desktop market share of Linux jumped from 2.53 percent in July to 3.37 percent in August. There’s no explanation for what amounted for this growth. Read more of this story at Slashdot.

Taken from:
Linux Desktop Market Share Crosses 3%

A New Amiga Will Go On Sale In Late 2017

An anonymous reader quote the Register: The world’s getting a new Amiga for Christmas. Yes, that Amiga — the seminal Commodore microcomputers that brought mouse-driven GUIs plus slick and speedy graphics to the masses from 1985 to 1996… The platform died when Commodore went bankrupt, but enthusiasm for the Amiga persisted and various clones and efforts to preserve AmigaOS continue to this day. One such effort, from Apollo Accelerators, emerged last week: the company’s forthcoming “Vampire V4” can work as a standalone Amiga or an accelerator for older Amigas… There’s also 512MB of RAM, 40-and-44-pin FastIDE connectors, Ethernet, a pair of USB ports and MicroSD for storage [PDF]. Micro USB gets power to the board. A school in Michigan used the same Amiga for 30 years. Whenever it broke, they actually phoned up the high school student who original set it up in 1987 and had him come over to fix it. Read more of this story at Slashdot.

See original article:
A New Amiga Will Go On Sale In Late 2017

Exploit Derived From EternalSynergy Upgraded To Target Newer Windows Versions

An anonymous reader writes: “Thai security researcher Worawit Wang has put together an exploit based on ETERNALSYNERGY that can also target newer versions of the Windows operating system, ” reports Bleeping Computer. “ETERNALSYNERGY is one of the NSA exploits leaked by the Shadow Brokers hacking group in April this year. According to a Microsoft technical analysis, the exploit can allow an attacker to execute code on Windows machines with SMB services exposed to external connections. The exploit works up to Windows 8. According to Microsoft, the techniques used in the original ETERNALSYNERGY exploit do not work on newer platforms due to several kernel security improvements. Wang says his exploit targets the same vulnerability but uses a different exploitation technique. His method ‘should never crash a target, ‘ the expert says. ‘Chance should be nearly 0%, ‘ Wang adds.” Combining his exploit with the original ETERNALSYNERGY exploit would allow a hacker to target all Windows versions except Windows 10. This is about 75% of all Windows PCs. The exploit code is available for download from Wang’s GitHub or ExploitDB. Sheila A. Berta, a security researcher for Telefonica’s Eleven Paths security unit, has published a step-by-step guide on how to use Wang’s exploit. Read more of this story at Slashdot.

View article:
Exploit Derived From EternalSynergy Upgraded To Target Newer Windows Versions

Media Player Classic Home Cinema (MPC-HC) for Windows Pushes What Could Be Its Last Update

Popular open-source media player for Windows, Media Player Classic Home Cinema — or MPC-HC, has issued what it says could be the last update the app ever receives. The team writes: v1.7.13, the latest, and probably the last release of our project… For quite a few months now, or even years, the number of active developers has been decreasing and has inevitably reached zero. This, unfortunately, means that the project is officially dead and this release would be the last one. … Unless some people step up that is. So, if someone’s willing to really contribute and has C/C++ experience, let me know on IRC or via e-mail. Otherwise, all things come to an end and life goes on. It’s been a nice journey and I’m personally pretty overwhelmed having to write this post. Read more of this story at Slashdot.

More:
Media Player Classic Home Cinema (MPC-HC) for Windows Pushes What Could Be Its Last Update

London police arrest four in Windows support scam bust

Enlarge / Customers of the telecommunications and Internet provider TalkTalk are among those who have been targeted in a Windows support scam operation in the UK. London Police announced the arrest of four suspected of involvement with the ring today. (credit: Carl Court/Getty Images) City of London Police, collaborating with Microsoft, have made four arrests as the result of a two-year investigation into rings of “Windows support” fraudsters. The arrests, London Police Commander Dave Clark told the press, “are just the beginning of our work, making the best use of specialist skills and expertise from Microsoft, local police forces, and international partners to tackle a crime that often targets the most vulnerable in our society.” The four suspects—a man and woman working together in Surrey, and another couple working from South Shields, Tyneside, are accused of being involved with a scheme operating out of a call center in India. Their role in the scams is not clear. The scam, similar to the one Ars intercepted in January , seeks to convince would-be victims to install remote-access software on their computers and then to set up recurring credit card billing for technical support or anti-virus software. In these cases, the scammers often posed as employees of the UK Internet service providers BT and TalkTalk, saying that they had been authorized by Microsoft to provide technical support. Read 2 remaining paragraphs | Comments

Read the original post:
London police arrest four in Windows support scam bust

Samsung Left Millions Vulnerable To Hackers Because It Forgot To Renew a Domain

An anonymous reader writes: Samsung cellphones used to have a stock app called S Suggest. The company apparently discontinued the app recently, and then forgot to renew a domain that was used to control it. This snafu left millions of smartphone users vulnerable to hackers who could’ve registered the domain and installed malicious apps on the phones. Read more of this story at Slashdot.

Originally posted here:
Samsung Left Millions Vulnerable To Hackers Because It Forgot To Renew a Domain