dicula nulla est There is no spoon. https://itsnothing.net/ Fri, 03 Oct 2025 00:52:38 +0000 Fri, 03 Oct 2025 00:52:38 +0000 Jekyll v3.10.0 TunnelCrack Attack leaks traffic outside VPN <p>Authored by <a href="https://distrinet.cs.kuleuven.be/">KU Leuven</a>, <a href="https://cyber.nyu.edu/">NYU</a>, and <a href="https://nyuad.nyu.edu/en/research/faculty-labs-and-projects/nyuad-ccs.html">NYU Abu Dhabi</a></p> <blockquote> <p>Our tests indicate that <strong>every VPN product is vulnerable on at least one device</strong>. We found that VPNs for iPhones, iPads, MacBooks, and macOS are extremely likely to be vulnerable, that a majority of VPNs on Windows and Linux are vulnerable, and that Android is the most secure with roughly one-quarter of VPN apps being vulnerable. The discovered vulnerabilities can be abused regardless of the security protocol used by the VPN. (“Every VPN product” is a misjudgement, and they are not responsible for this judgement but they are responsible for fixing this accusation in their report and their website.)</p> <p>The two resulting attacks are called the LocalNet and ServerIP attack. Both can be exploited when a user connects to an untrusted Wi-Fi network. Our ServerIP attack can also exploited by malicious Internet service providers. The attacks manipulate the victim’s routing table to <strong>trick the victim into sending traffic outside the protected VPN tunnel</strong>, allowing an adversary to read and intercept transmitted traffic.</p> </blockquote> <h2 id="localnet-attack">LocalNet Attack</h2> <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36672">CVE-2023-36672</a>: LocalNet attack resulting in leakage of traffic in plaintext. The reference CVSS score is <a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&amp;version=3.1">6.8</a>.</li> <li> <p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35838">CVE-2023-35838</a>: LocalNet attack resulting in the blocking of traffic. The reference CVSS score is <a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&amp;version=3.1">3.1</a>.</p> </li> <li>adversary acts as a malicious Wi-Fi or Ethernet network, and tricks the victim into connecting to this network</li> <li>Here there adversary wants to intercept traffic to target.com, which has the IP address 1.2.3.4. To accomplish this, the adversary tells the victim that the local network is using the subnet 1.2.3.0/24. In other words, the victim is informed that IP addresses in the range 1.2.3.1-254 are directly reachable in the local network. When the victim now visits target.com, a web request will be sent to the IP address 1.2.3.4.</li> </ul> <h2 id="serverip-attack">ServerIP Attack</h2> <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36673">CVE-2023-36673</a>: ServerIP attack, combined with DNS spoofing, that can leak traffic to arbitrary IP address. The reference CVSS score is <a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N&amp;version=3.1">7.4</a>.</li> <li> <p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36671">CVE-2023-36671</a>: ServerIP attack where only traffic to the real IP address of the VPN server can be leaked. The reference CVSS score is <a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N&amp;version=3.1">3.1</a>.</p> </li> <li><strong>VPNs don’t encrypt traffic towards the IP address of the VPN server</strong></li> <li>adversary first spoofs the DNS reply for vpn.com to return the IP address 1.2.3.4, which equals the IP address of target.com</li> <li>victim will then connect with the VPN server at 1.2.3.4</li> <li>adversary still redirects this traffic to the real VPN server</li> <li><strong>victim will add a routing rule so that all traffic to the VPN server, in this case the spoofed IP address 1.2.3.4, is sent outside the VPN tunnel</strong></li> </ul> <h2 id="am-i-affected-by-this-vulnerability"><strong>Am I affected by this vulnerability?</strong></h2> <ul> <li>all built-in VPN clients of Windows, macOS, and iOS</li> <li>Android 12 and higher is <strong>not</strong></li> <li>significant number of Linux VPNs</li> <li>most OpenVPN profiles, when used with a vulnerable VPN client, may be</li> </ul> <h2 id="how-can-i-learn-more-about-tunnelcrack"><strong>How can I learn more about TunnelCrack?</strong></h2> <blockquote> <p>For more details about the ServerIP experiments, see <a href="https://tunnelcrack.mathyvanhoef.com/#paper">our paper</a>. Our paper behind the attack is titled <a href="https://papers.mathyvanhoef.com/usenix2023-tunnelcrack.pdf">Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables</a> and will be presented at <a href="https://www.usenix.org/conference/usenixsecurity23/presentation/xue">USENIX Security 2023</a>. To prevent the attack, VPN clients should be updated to send all traffic through the VPN tunnel, except traffic generated by the VPN app itself.</p> </blockquote> <hr /> <h5 id="references">References</h5> <ul> <li><a href="https://github.com/vanhoefm/vpnleaks">Github repository for POC</a> (no code, just demo)</li> <li><a href="https://tunnelcrack.mathyvanhoef.com/details.html">More details can be found on the mirror with more information</a></li> <li><a href="https://www.reddit.com/r/mullvadvpn/comments/15mhel9/response_to_tunnelcrack_vulnerability_disclosure/">Response from Mullvad</a></li> <li><a href="https://www.reddit.com/r/ProtonVPN/comments/15lwgdi/comment/jvfcuz9/">Reasons why ProtonVPN is not vulnerable <strong>except on iOS</strong> (that’s not Proton’s fault)</a></li> </ul> <h5 id="bibliography">Bibliography</h5> <div class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>@inproceedings{usenix2023-tunnelcrack, author = {Nian Xue and Yashaswi Malla and Zihang Xia and Christina P\"opper and Mathy Vanhoef}, title = {Bypassing Tunnels: Leaking {VPN} Client Traffic by Abusing Routing Tables}, booktitle = {Proceedings of the 32th {USENIX} Security Symposium}, year = {2023}, month = {August}, publisher = {\{USENIX} Association} } </code></pre></div></div> Mon, 14 Aug 2023 00:00:00 +0000 https://itsnothing.net/2023/08/14/tunnelcrack-attack-leaks-traffic-outside-vpn.html https://itsnothing.net/2023/08/14/tunnelcrack-attack-leaks-traffic-outside-vpn.html What's a SIM card, and how do I secure it? <h2 id="perceived-sim-card-opsec">Perceived SIM card OPSEC</h2> <p>SIM cards provide a degree of privacy by allowing users to control their identity and access to mobile services, but users should also be mindful of other potential privacy risks and take appropriate measures to protect their personal information.</p> <p>The Subscriber Identity Module is a topic which I have talked about on my blog before, but never at length. I’ve talked about what to do to prevent, or significantly lower the risk of, SIM swaps. But what are SIM cards? What do they store, really? I usually don’t find the need to talk about SIM cards in the realm of cybersecurity. However, it poses an interesting topic as it has received a rise in popularity as a threat rather than a convenience. Here, I will discuss the increase in cyberattacks targeting mobile phones, specifically SIM cards: (1) how do they work and (2) how do attackers leverage them for profit?</p> <p>This post is not to inform hackers on techniques, tools, and procedures (“TTPs”), but rather it should be considered an informative article on the dangers of mobile phones realistically, not just as some tinfoil persona. The cellular devices that you know and use (and likely carry everywhere) are not impervious to spyware, malware and unwanted behavior, however, most people don’t fully understand these risks and the importance of having the knowledge of how to protect your phones. Some dangers involved in carrying a mobile device include tracking, spyware, surveillance, and even stalking. We’ll discuss these all in depth, and we’ll also discuss ways to prevent them, or at least decrease the likelihood of being targeted by individuals, corporations, and even the government.</p> <h2 id="origins-of-the-sim-card-and-necessity-on-cell-networks">Origins of the SIM card and necessity on cell networks</h2> <p>In the early 1990s, GSM (Group systems for mobile communications) was developed as a standard for mobile communication. It introduced the 2G protocol, which became widely used in smartphones. The first deployment of GSM took place in Finland in December 1991. Over time, GSM <a href="https://www.wired.com/2010/06/wired-explains-4g/">evolved into 3G and 4G technologies</a>. SIM (Subscriber Identity Module) cards are used to store user information such as IMSI, ICCID, Authentication Key, Location Area Identity (LAI), and national emergency call operator details. SIM cards provide identification and authentication across different telecom operators and incorporate <a href="https://en.wikipedia.org/wiki/COMP128">COMP128v1</a> authentication algorithms, including A3 for network security and A8 for encryption keys related to authentication key security. SIM cards come in different versions, including standard, micro, and nano.</p> <ol> <li>Standard SIM: The standard SIM card, also known as a mini SIM, is the traditional form factor used in older mobile devices. It is larger in size compared to the newer versions and is gradually being phased out in favor of smaller SIM card types.</li> <li>Micro SIM: The Micro SIM card is smaller than the standard SIM and was introduced to accommodate slimmer smartphones. It retains the same functionality as the standard SIM but has a reduced form factor.</li> <li>Nano SIM: The Nano SIM card is the smallest SIM card type currently available and is commonly used in modern smartphones. It is significantly smaller than both the standard and micro SIM cards and requires specialized tools to handle due to its compact size.</li> </ol> <p>SIM cards play a crucial role in the interaction between mobile devices and the GSM network. When a SIM card is inserted into a mobile device, it provides the necessary identification and authentication information for the device to connect to the GSM network. The SIM card stores essential data such as the International Mobile Subscriber Identity (IMSI), Integrated Circuit Card ID (ICCID), and authentication key. This information allows the device to establish a secure connection with the network and access services like voice calls, messaging, and mobile data. The GSM network uses the SIM card’s information to verify the user’s identity, authorize network access, and apply specific service features based on the user’s subscription. This interaction ensures the seamless functioning of mobile devices within the GSM network, enabling communication and access to various network services.</p> <h2 id="real-risks-of-sim-cards-and-its-implications">Real risks of SIM cards and its implications</h2> <p>By using the SIM card, customers can have a level of control over their personal information and access to mobile services. The SIM card allows customers to switch between different mobile devices while retaining their identity and subscribed services. This offers a level of privacy and convenience.</p> <p>However, it’s important to note that while SIM cards provide some privacy protection, they do not guarantee complete privacy. Mobile network operators and authorized parties can still access certain information stored on the SIM card, such as call records and location data, for legitimate purposes like billing and providing network services. Additionally, SIM cards are subject to security vulnerabilities and can be targeted by hacking or unauthorized access attempts.</p> <p>Why are hackers targeting SIM cards? Mostly for fraud, and otherwise profit. The SIM contains its own microprocessor (CPU), program memory (ROM), working memory (RAM), data memory (EPROM or E2PROM), and serial communication module. The SIM card interacts with the mobile device through a serial Input/output (I/O) connection, serving as a communication link. The T0 protocol is commonly used, defining the electrical coding for commands and responses between the mobile device and SIM card. The SIM card operates in a passive role, responding to commands from the mobile device and providing “Status Words” as responses. It cannot initiate communication with the device independently.</p> <p>SIM cards pose several <a href="/2022/01/27/a-proper-threat-model.html">threats to personal information security</a>:</p> <ol> <li><strong>Confidential information</strong>: SIM cards can store sensitive data like login IDs, passwords, and messages related to bank accounts and social networking sites, making them potential targets for unauthorized access and identity theft.</li> <li><strong>Personal and professional data</strong>: SIM cards may contain personal and professional messages, important contact information, and call logs. If accessed by unauthorized individuals, this information could be exploited for malicious purposes.</li> <li><strong>Deleted data recovery</strong>: deleted messages can potentially be recovered from SIM cards, posing a risk of privacy breaches even after data deletion.</li> <li><strong>Data persistence</strong>: SIM card data is resistant to various environmental conditions such as heat, flame, dust, moisture, stains, and magnetic fields. This persistence makes it difficult to destroy the data stored on a SIM card through ordinary means.</li> <li><strong>Physical damage</strong>: while scratches and striations may not render a SIM card unreadable, physical damage inflicted by compression marks, such as from a stone or hammer, can make the card unreadable. I prefer to use a screwdriver or drill if I have time to spare. Screwdriver and hammer to split the “fibers” of embedded chips and capacitors, and a drill to completely penetrate and destroy the platters of storage devices.</li> <li><strong>Data recovery</strong>: even if a SIM card becomes unreadable or damaged, it can potentially be read by replacing the EEPROM chip into a new SIM card or by using proper probing techniques. This highlights the need for proper disposal or secure handling of old SIM cards.</li> </ol> <p>To protect private data from being easily stolen using a SIM card reader, <em>it is recommended to break the SIM card into two pieces</em> before discarding it, making it significantly harder for strangers or criminals to access private information.</p> <p>To prevent forensic recovery and ensure the secure disposal of a SIM card, <em>it is recommended to follow a thorough process that involves physical destruction</em>. Here is an in-depth description of the process:</p> <h2 id="protecting-yourself-against-forensics">Protecting yourself against forensics</h2> <p>You will need a pair of pliers, scissors, or a sharp knife, as well as safety gloves to protect your hands. Remove the SIM card from the mobile device. Power off the mobile device and locate the SIM card slot. You will use a SIM card ejector tool or a small paperclip to remove the SIM card from the device.</p> <p>First, disable the SIM card: access the device settings. Disable any security features or PIN codes associated with the SIM card. This step ensures that the SIM card does not prompt for authentication when attempting to access the data. When you’ve removed the SIM, physically destroy it by placing it on a flat and sturdy surface, and, using the pliers, scissors, or a sharp knife, applying pressure or cut through the SIM card. Start by severing the gold contacts and then proceed to cut or break the rest of the card into multiple pieces. Make sure to apply enough force to render the card irreparable. Dispose of the SIM card safely: once the SIM card is completely destroyed, separate the broken pieces. It is advisable to dispose of the pieces in separate trash bins or through different waste collection methods. This helps further ensure that the card cannot be reconstructed or retrieved. Remember, failure to dispose of SIM cards can result in retrieval of sensitive data. It is very important to not only physically destroy it but also <em>not to leave the pieces in the same bin</em>. If it’s not incinerated or degaussed, you should always use at least two bins.</p> <p>By following this process, you significantly reduce the chances of forensic recovery and unauthorized access to the data stored on the SIM card. However, it’s critical to note that physical destruction does not guarantee absolute security, and if highly sensitive data is involved, additional precautions may be necessary, such as incineration or professional destruction services.</p> <h2 id="to-protect-yourself-follow-these-practices">To protect yourself, follow these practices</h2> <p><strong>Use strong authentication</strong>: set a strong alphanumeric passcode for your SIM card to prevent unauthorized access, or at the very least, use a long PIN. This adds an extra layer of security, ensuring that even if your device is lost or stolen, your SIM card remains protected. Most telecoms will allow a registration PIN or subscriber PIN to prevent unauthorized changing of your number or inserting into a new device without your permission. This is one of the most important steps in this article.</p> <p><strong>Enable two-factor authentication (2FA)</strong>: whenever possible, enable 2FA for your mobile services. This is an additional step for authentication, typically involving a verification code sent to your SIM card, further securing your identity and preventing unauthorized access. You can use <a href="https://en.wikipedia.org/wiki/Time-based_one-time_password">TOTP</a> (time-based authentication mechanism) or something like a <a href="https://www.yubico.com/">hardware key</a> from Yubico. Store your TOTP separate from your passwords and do not keep them in your password manager, as any unauthorized access to your manager would lead to compromise of the sensitive time-based codes as well.</p> <p><strong>Regularly update software and firmware</strong>: keep your mobile device’s software and firmware up to date. Updates often include security patches and bug fixes that help protect against potential vulnerabilities and threats.</p> <p><strong>Be wary of phishing attempts</strong>: exercise caution when receiving text messages, emails, or phone calls asking for personal or sensitive information. Telecom providers typically do not request such information through unsolicited communications. Be vigilant and avoid sharing personal information unless you can verify the legitimacy of the request. Your bank and your telecom provider will never ask for your sensitive details over the phone. If they do, consider that it isn’t in your best interest to share anywhere but in person to a credentialed employee or technician.</p> <p><strong>Monitor account activities</strong>: regularly review your mobile service account activities, such as call logs, text message records, and data usage. If you notice any suspicious or unfamiliar activities, report them to your telecom provider immediately. You have the option to subscribe to services that can do this for you, either manually or automatically, like <a href="https://joindeleteme.com/">Delete Me</a>.</p> <p><strong>Secure network connections</strong>: when accessing the internet or using mobile data, connect to secure and trusted networks. Avoid using public Wi-Fi networks, which can be susceptible to eavesdropping and data interception. Consider using a virtual private network (VPN) for additional privacy and encryption. <strong>VPNs do not offer anonymity.</strong> You could also consider use of <a href="https://safing.io/">SafingIO’s SPN</a> Anonymity can only be offered by proper onion routing via <a href="https://www.torproject.org/">the Tor network</a> or <a href="https://geti2p.net/en/">the i2p network</a>.</p> <p><strong>Protect Physical Security</strong>: keep your mobile device and SIM card in a secure location, such as a safe or loclbox. Avoid lending your device to others or leaving it unattended in public places. Do not hand your devices to strangers to make calls becasue this is a tactic used by thieves. You’d think this is common sense, but it has been used before to nab physical devices from darknet vendors and admins. Physical security of your device helps prevent unauthorized access. By following these measures, you can enhance the protection of your identity at the telecom level while using a SIM card, reducing the risk of identity theft, unauthorized access, and fraudulent activities.</p> <p>In conclusion, protecting your identity while using a SIM card requires a combination of proactive measures and responsible practices. By implementing strong authentication, enabling two-factor authentication, keeping your software up to date, being vigilant against phishing attempts, monitoring account activities, securing network connections, and maintaining physical security, you can significantly enhance the protection of your personal information. Besides the registration PIN at your provider, which can be a real life-saver, remember to dispose of old SIM cards properly by physically destroying them to prevent forensic recovery. By taking these precautions, you can enjoy a safer and more secure mobile experience, reducing the risk of identity theft and unauthorized access to your sensitive data.</p> <h2 id="references">References</h2> <ol> <li> <p>Huurdeman, A. A. (2003). <em>The Worldwide History of Telecommunications</em>. John Wiley &amp; Sons.</p> </li> <li> <p>Gudimalla, T. K. M., P, V., &amp; Kannan, S. (2019). Survey Analysis of Cloned SIM Card. <em>SSRN Electronic Journal</em>. <a href="https://doi.org/10.2139/ssrn.3431642">https://doi.org/10.2139/ssrn.3431642</a></p> </li> <li> <p>Oyediran, O., Omoshule, A., Misra, S., Maskeliūnas, R., &amp; Damaševičius, R. (2019). Attitude of mobile telecommunication subscribers towards sim card registration in Lagos State, Southwestern Nigeria. <em>International Journal of System Assurance Engineering and Management</em>, <em>10</em>(4), 783–791. <a href="https://doi.org/10.1007/s13198-019-00809-6">https://doi.org/10.1007/s13198-019-00809-6</a></p> </li> <li> <p>Srivastava, A., &amp; Vatsal, P. (2016). Forensic Importance of SIM Cards as a Digital Evidence. <em>Journal of Forensic Research</em>, <em>07</em>(02). <a href="https://doi.org/10.4172/2157-7145.1000322">https://doi.org/10.4172/2157-7145.1000322</a></p> </li> </ol> Thu, 11 May 2023 00:00:00 +0000 https://itsnothing.net/2023/05/11/On-SIM-card-usage-and-risks.html https://itsnothing.net/2023/05/11/On-SIM-card-usage-and-risks.html Let's talk about the "RESTRICT Act" <p>Let’s talk about the RESTRICT Act</p> <p>The Senate text summary of S.686 - RESTRICT Act, <a href="https://www.congress.gov/member/mark-warner/W000805">Sen. Warner, Mark R. [D-VA]</a> (Introduced 03/07/2023) is as follows:</p> <blockquote> <p>“The purpose of the bill is to create a framework for the federal government to identify, assess, and address national security threats posed by certain types of information and communications technology (ICT) products and services.”</p> </blockquote> <p>It would prohibit federal agencies from purchasing or using specific products and services. The bill would also establish a grant program to assist small and rural communication providers in replacing any equipment or services that have been deemed to pose a national security threat.</p> <p>In addition, the bill would establish a program within the National Institute of Standards and Technology (NIST) to develop standards and guidelines for the secure use of ICT products and services, and it would require the Director of National Intelligence to provide an annual report on the national security risks posed by ICT products and services.</p> <p>Overall, the goal of the RESTRICT Act is to strengthen the security of the United States’ ICT infrastructure by identifying and addressing potential national security threats posed by certain ICT products and services. It also appears that it references <a href="https://www.archives.gov/isoo/policy-documents/cnsi-eo.html">Executive Order 13526</a> as well, an Order enacted by President Obama which summarily defines:</p> <blockquote> <p><strong>“a uniform system for classifying, safeguarding, and declassifying national security information, including information relating to defense against transnational terrorism”</strong>.</p> </blockquote> <p>Notice also the term “joint resolution” mentioned freely in its pages.</p> <blockquote> <p>“Joint resolutions may originate either in the House of Representatives or in the Senate. There is little practical difference between a bill and a joint resolution. Both are subject to the same procedure, except for a joint resolution proposing an amendment to the Constitution. On approval of such a resolution by two-thirds of both the House and Senate, it is sent directly to the Administrator of General Services for submission to the individual states for ratification.”</p> </blockquote> <p>If that’s too confusing, the ELI5 is this type of resolution would be used if Congress wants to disagree with a determination made by the Secretary of Commerce under Section 3 of the bill. The section sets out a specific process for considering this type of resolution, including waiving certain rules and limiting debate to 10 hours. Waiving the requirements for a vote of disapproval or approval, in either case, would be highly unethical.</p> <h2 id="what-does-this-bill-actually-introduce-into-federal-law">What does this bill actually introduce into federal law?</h2> <ol> <li>creation of a framework for the identification and assessment of national security risks posed by certain ICT products and services, including the establishment of an interagency process for identifying and assessing these risks;</li> <li>prohibition on federal agencies purchasing or using ICT products and services that have been identified as posing a national security risk;</li> <li>creation of a grant program to assist small and rural communication providers in replacing any equipment or services that have been deemed to pose a national security risk;</li> <li>establishment of a program within the National Institute of Standards and Technology (NIST) to develop standards and guidelines for the secure use of ICT products and services;</li> <li>the requirement for the Director of National Intelligence to provide an annual report on the national security risks posed by ICT products and services.</li> </ol> <p>In this sense, the RESTRICT Act could be seen as a way for the federal government to exert greater control over the purchase, use, and sale of certain ICT equipment and services that are deemed to pose a national security threat. (Essentially, as it sees fit to do so.)</p> <p>Yes, up to and including the VPNs and virtual credit cards services we all know and love. :(</p> <h2 id="similar-texts-to-s686-with-overarching-legislation">Similar texts to S.686 with overarching legislation</h2> <ol> <li><a href="https://www.congress.gov/115/bills/s2098/BILLS-115s2098rs.pdf">S.2098 - 115th Congress (2017-2018): Foreign Investment Risk Review Modernization Act of 2018</a> (05/22/2018) - expands the scope of such “covered transactions”;</li> <li>McCaul, Meeks, Gallagher, Langevin, Kinzinger, Keating Reintroduce the <a href="https://foreignaffairs.house.gov/press-release/mccaul-meeks-gallagher-langevin-kinzinger-keating-reintroduce-the-cyber-diplomacy-act/">Cyber Diplomacy Act</a>. <em>Committee on Foreign Affairs</em>.</li> <li>Rep. Escobar, V. [D-T.-16. (2022, November 1). <a href="https://www.congress.gov/bill/117th-congress/house-bill/3557?s=1&amp;r=17"><em>H.R.3557 - 117th Congress (2021-2022): Homeland Security Improvement Act</em></a>.</li> <li>Sen. Schumer, C. E. D-N. (2021, June 8). <a href="https://www.congress.gov/117/bills/s1260/BILLS-117s1260es.pdf"><em>S.1260 - 117th Congress (2021-2022): United States Innovation and Competition Act of 2021</em></a> (06/08/2021)</li> </ol> Tue, 28 Mar 2023 00:00:00 +0000 https://itsnothing.net/2023/03/28/Lets-talk-about-the-RESTRICT-Act.html https://itsnothing.net/2023/03/28/Lets-talk-about-the-RESTRICT-Act.html On MSPs <p>First, let’s note a couple things about them:</p> <ol> <li>paid to secure <em>your</em> infrastructure - can’t even secure <em>their</em> infrastructure a majority of the time</li> <li>account for majority of large-scale attacks on FVEY by foreign gov</li> </ol> <p>So can they really be trusted with our nation’s infrastructure?</p> <h2 id="cold-hard-facts-produce-cold-hard-cash">Cold hard facts produce cold hard cash</h2> <ul> <li><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/2677750/nsa-partners-release-cybersecurity-advisory-on-brute-force-global-cyber-campaign/">GRU is performing brute force attacks since mid-2019</a> <ul> <li>incredibly easy to brute force <em>en mass</em></li> <li>Russian General Staff Main Intelligence Directorate(GRU) 85<sup>th</sup> Main Special Service Center (GTsSS) <ul> <li><a href="https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/1/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF">GRU Conducting Global Brute Force Campaign</a></li> </ul> </li> </ul> </li> <li><a href="https://www.ncsc.gov.uk/news/microsoft-update-brute-force-password-spraying">Microsoft advisory - NOBELIUM</a> (pt 1)</li> <li><a href="https://msrc-blog.microsoft.com/2021/06/25/new-nobelium-activity/">Microsoft blog - NOBELIUM APT</a> (pt 2)</li> <li><a href="https://www.ncsc.gov.uk/guidance/phishing">Phishing is such a massive revenue generator, it’s used against MSPs</a> <ul> <li><a href="https://www.ncsc.gov.uk/files/phishing_case_study.pdf">Case study</a></li> </ul> </li> </ul> <h2 id="msps-dont-use-basic-domain-protections">MSPs don’t use basic domain protections:</h2> <ul> <li>multi-layer security/restriction approach involving people and processes (<a href="/2022/07/27/OSI-model.html">OSI Model</a>)</li> <li>SSO (application and network layer)</li> <li>requirements engineering process <sup id="fnref:1" role="doc-noteref"><a href="#fn:1" class="footnote" rel="footnote">1</a></sup> [Faroom2019]</li> <li>SPF and DMARC (e-mail threats)</li> <li>network segregation</li> <li>least privilege</li> <li>depreciate obsolete accounts and processes</li> <li>maintenance and updates regularly</li> <li>rolling backups on-prem and in the cloud</li> <li><em>Mandatory Access Controls</em> (SELinux, SSO, network permissions)</li> </ul> <p>These truly are basic fundamentals of security and should be utilized at the bare minimum by companies paid to protect the infrastructure and systems (e.g., applications and controllers) of SMB’s and large companies. But they’re just not. Why?</p> <h2 id="references">References</h2> <div class="footnotes" role="doc-endnotes"> <ol> <li id="fn:1" role="doc-endnote"> <p>Zowghi, Didar &amp; Sahraoui (2023). <em>A Lightweight Workshop-Centric Situational Approach for the Early Stages of Requirements Elicitation in Software Development</em>. <a href="#fnref:1" class="reversefootnote" role="doc-backlink">&#8617;</a></p> </li> </ol> </div> Tue, 02 Aug 2022 00:00:00 +0000 https://itsnothing.net/2022/08/02/on-MSPs.html https://itsnothing.net/2022/08/02/on-MSPs.html OSI Model <p><strong>Please Do Not Throw Sausage Pizza Away</strong>.</p> <ol> <li>Physical - data, cables, cat6</li> <li>Data - Switching. MAC addresses</li> <li>Network - IP addresses, routing</li> <li>Transport - TCP/UDP</li> <li>Session - session management</li> <li>Presentation - WMV, JPEG, MOV (media)</li> <li>Application - HTTP, SMTP, etc.</li> </ol> Wed, 27 Jul 2022 00:00:00 +0000 https://itsnothing.net/2022/07/27/OSI-model.html https://itsnothing.net/2022/07/27/OSI-model.html Windows 11 <p>Windows 11 is trying to take away your autonomy by imposing lockdown and - while this may not be new - it has evolved slowly into a monopoly over your data. Now you are locked into their services; <em>their</em> cloud, <em>their</em> software, <em>their</em> hardware modules. They have been boiling you slowly in a pot for so long, you are becoming comfortable with it, and even, in some extreme cases, you are <strong>forced</strong> to get into the water.</p> <p>If you want encryption and you’re not tech savvy, you’re forced to use Windows’ encryption software (Bitlocker). If you want to save your data but aren’t tech savvy, you likely turn to easy solutions like this because it’s what is shipped in Windows Home. The average consumer is very forcibly “asked” to use their software and hardware in order to keep you so walled in that you can’t function without them. It’s very hard, as with Google and its parent company Alphabet, to switch out of this mindset.</p> <p>It’s a prison but you can break free.</p> Fri, 01 Jul 2022 00:00:00 +0000 https://itsnothing.net/2022/07/01/Windows-11.html https://itsnothing.net/2022/07/01/Windows-11.html Using Zettlr for note-taking <p>I find that <a href="https://www.zettlr.com/">Zettlr</a> [<em>ˈset·lər</em>] and <a href="https://www.zotero.org/">Zotero</a> make my life easier. I have used it to make bibliographies with several papers now, all while keeping a digital <a href="https://wikiless.org/wiki/Zettelkasten">Zettelkasten</a>. It just requires knowledge of Markdown syntax and how to use Zettlr for note-taking. The best part is how easy it is.</p> <p>You just need to download the extension for Zotero which is what you will be using to create citations – without having to install plugins on the website. You simply open Zotero, create a “Collection”, then you add references as you browse. If you go to a link in your browser and click the “Save to Zotero” button for the extension (it’s available for both Firefox and Chrome/Chromium browsers), you can save multiple references in your Collection. This allows you to, when done, simply export to a bibliography in various formats. It makes note-taking a breeze and it improves your ability to read without having to stop so often to manually write up your references and lookup things. There is a very handy setting in Zotero that allows to import all metadata for a certain DOI or arxiv number, just by pasting the number into the “Add Item(s) by Identifier” button. It pulls all the information for you in a second. No more manual references. The only thing is you will have to manually set the reference pointers like I have done in this post. Numbering and setting the #refs themselves is pretty easy, just create a numbered list in the markdown editor or your IDE.</p> Mon, 13 Jun 2022 00:00:00 +0000 https://itsnothing.net/2022/06/13/zettling-in.html https://itsnothing.net/2022/06/13/zettling-in.html What exactly does Windows collect on you? Well.. <p><strong>Just from one angle, the Bluetooth and Wi-Fi?</strong></p> <p>Geo-location via Wi-Fi &amp; Bluetooth: Whether it is Android, iOS, Windows, macOS, or even Ubuntu. Most popular Operating Systems now collect telemetry information by default even if you never opt-in or opted-out from the start. Some like Windows will not even allow disabling telemetry completely without some technical tweaks. This information collection can be extensive and include a staggering number of details (metadata and data) on your devices and their usage.</p> <p><strong>Itemized lists</strong>:</p> <ul> <li><a href="https://docs.microsoft.com/en-us/windows/privacy/required-windows-diagnostic-data-events-and-fields-2004">Full list of required diagnostic data</a></li> <li><a href="https://docs.microsoft.com/en-us/windows/privacy/windows-diagnostic-data">Full list of optional diagnostic data</a></li> </ul> <p><strong>Mitigation:</strong></p> <p><strong>W10Privacy:</strong></p> <ul> <li>Download and install <a href="https://www.w10privacy.de/english-home/">W10Privacy</a></li> <li><strong>Right-click</strong> &gt; <strong>Run as administrator</strong></li> <li>Check all the recommended (Green) settings and save.</li> <li>Optional but recommended (but could break things, use at your own risk), also check the orange/red settings, and save.</li> <li><strong>Reboot</strong></li> </ul> <p><strong>WindowsSpyBlocker:</strong></p> <ul> <li>Download and run <a href="https://crazymax.dev/WindowsSpyBlocker/download/">WindowsSpyBlocker</a></li> <li>Type <strong>1</strong> and go into <strong>Telemetry</strong></li> <li>Type <strong>1</strong> and go into <strong>Firewall</strong></li> <li>Type <strong>2</strong> and add <strong>Spy Rules</strong></li> <li><strong>Reboot</strong></li> </ul> <p><strong>Also, consider using O&amp;O ShutUp10++:</strong></p> <ul> <li>Download and run <a href="https://www.oo-software.com/en/shutup10">O&amp;O ShutUp10++</a></li> <li>Enable <em>at least</em> all of the recommended settings.</li> </ul> <p><strong>Settings</strong> &gt; <strong>Privacy</strong> &gt; <strong>Diagnostic</strong> &gt; <strong>Delete all Data</strong></p> <p><strong>You will need to update and re-run W10Privacy and WindowsSpyBlocker frequently and after any Windows update as they tend to silently re-enable telemetry using those updates.</strong></p> <p>As a bonus, it could be interesting to also consider <a href="https://github.com/beerisgood/windows10_hardening">hardening your Windows host</a>. (This is a security guide, not a privacy guide.)</p> <p><strong><a href="https://anonymousplanet.org/">The Hitchhiker’s Guide to Online Anonymity</a></strong></p> <blockquote> <p><strong>Disclaimer:</strong> I am the co-owner of THGTOA above.</p> </blockquote> Sun, 12 Jun 2022 00:00:00 +0000 https://itsnothing.net/2022/06/12/what-windows-does-with-all-your-data.html https://itsnothing.net/2022/06/12/what-windows-does-with-all-your-data.html Take back control of your data <h3 id="steps">Steps:</h3> <p>Embrace a zero trust model. Don’t rely on reactive security practices. Never trust. Always verify. Never put all your eggs into one basket.</p> <p>These are ~3 things you should absolutely be doing:</p> <p><strong>1. Better passwords:</strong></p> <ul> <li>go change them all, <strong>seriously, right now!</strong></li> <li>use strong/non-unique passwords (<a href="https://github.com/grempe/diceware">diceware</a>)</li> <li>never mix or reuse them across services/accounts</li> <li>use a password manager (preferably offline, like KeePassXC)</li> <li>avoid sharing passwords and use something that notifies you of breaches (but don’t rely solely on reactive security)</li> <li>enable 2FA/MFA, possibly use hardware keys/tokens</li> <li>backup everything just in case</li> <li>update your OS with security updates and employ active IDS/IPS (it’s not as hard as it sounds)</li> <li>disable and/or avoid telemetry from your OS, browser and IoT devices</li> <li>don’t use browser storage for sensitive info including passwords</li> </ul> <p><strong>2. Better browsing:</strong></p> <ul> <li>block ads at the host level (Pi-hole, DNSSEC/DNSCRYPT, /etc/hosts, router VPN)</li> <li>uBlock Origin, LibRedirect, Smart Referrer</li> <li>ensure website integrity (in Tor, you can verify a site’s /mirrors.txt)</li> <li>use a private search engine (SearXNG, DuckDuckGo, Brave)</li> <li>don’t use unnecessary extensions (cf. <a href="https://github.com/arkenfox/user.js/wiki/4.1-Extensions#-dont-bother">https://github.com/arkenfox/user.js/wiki/4.1-Extensions</a>) - useless bullshit</li> <li>use HTTPS (default in your regular browser usually)</li> <li>DNS over HTTPS (DOH)</li> <li>containerize and/or sanitize browsing in-between sessions, (again, Arkenfox/user.js)</li> <li>minimize your footprint/fingerprint (Firefox RFP)</li> <li>plain-text emails only, question all attachments from all sources</li> </ul> <p><strong>3. Practice your OPSEC:</strong></p> <ul> <li>don’t login on another person’s device and use privacy shields if you can</li> <li>avoid password hints or use answers that have nothing to do with them (confuse the enemy :))</li> <li>don’t use a 4-digit pin for your devices, use a strong password</li> <li>minimize or eliminate the SMS 2FA for services to avoid SIM swaps</li> <li>avoid using your password manager for OTP</li> <li>avoid face and biometric unlocks</li> <li>never reuse usernames</li> <li>use a mail forwarding service to combat spam (and further confuse the enemy)</li> <li>use security keys (YubiKey, etc.) for U2F/OATH/FIDO; they are resistant to phishing</li> <li><a href="https://github.com/Lissy93/personal-security-checklist">personal security checklist</a></li> </ul> Sun, 12 Jun 2022 00:00:00 +0000 https://itsnothing.net/2022/06/12/take-back-control.html https://itsnothing.net/2022/06/12/take-back-control.html Removing microdots from printed documents <p>Anonymize your documents by removing metadata and ensure you don’t have any identifying marks embedded.</p> <p>For hundreds of years, paper and printing techniques are the foundation for distribution of information. Thereby, physical documents enjoy high confidence. To have something in “black and white” carries significance. But forgery or alteration of documents are nearly as old as the history of writing. Hence the question for the originator is important. Nowadays, because of continual technological development, even individuals can print high-quality documents and duplicates. This can be done with cheap and customary devices. In addition image processing software, like GIMP or Adobe Photoshop, allows to manipulate documents and images easily. Therefore printed documents are often an issue in crimes, e.g. faked proof of identity, copyright theft, or as exhibit in a criminal case. In all this cases it could be useful for law enforcement agencies to, e.g., identify the device or model which was used to print the questionable document.</p> <p>The primary focus of the research lies on the extraction of artifacts, which are originated from the print process. These artifacts emerge particularly through electromechanical imperfections and also through differences between constructions of printer models. We try to find and analyze artifacts which are stable and e.g. model specific and therefore usable as intrinsic signatures for a specific printer model. The extraction of these signatures should be conducted with customary scanner devices and image processing techniques. Simultaneously, the company Dence (cooperation partner) will investigate the scanner forensics.</p> <p>The second part of the project deals with research of print-scan resilient checks of duplicates. Here the knowledge about artifacts which occur in the print and scan process represent a reliable basis. As use case the typical workflow in an insurance can be mentioned. In the event of damage, the insured person would take a photo of the damage and send it postal, together with forms, to the insurance. Afterwards the insurance will scan these documents. The insurance staff examines the event of damage on the basis of the digital reproduction. Because of the print and scan processes, which the original document went through, the question of authenticity of the document is difficulty to answer. Goal of the analysis is the implementation of an image search for duplicates, which is resilient against the print and scan process. This means, that images can also be matched, if only printed and re-digitized versions are available. The duplicate testing must be able to check an image immediately against a data pool with millions of images. From technical view, this will be realized with a distinct image hash. The challenge for the print-scan scenario is the computation of this hash. The hash value has to be equal or very similar between the original photo and the printed and re-digitized image, so that they can matched. Another difficulty is a working check for duplicates also with slight manipulations in the image (like a car scratch). All of this must be accomplished without matching false positives.</p> <h3 id="references">References</h3> <ul> <li>https://dfd.inf.tu-dresden.de/</li> <li>https://github.com/dfd-tud/deda</li> </ul> Thu, 09 Jun 2022 00:00:00 +0000 https://itsnothing.net/2022/06/09/microdots-and-nuking-them.html https://itsnothing.net/2022/06/09/microdots-and-nuking-them.html