The Linkielist

Linking ideas with the world

The Linkielist

Netgear was told in January its routers can be hacked and hijacked. This week, first patches released – after exploits, details made public

Netgear has issued patches to squash security vulnerabilities in two router models that can be exploited to, for instance, open a superuser-level telnet backdoor.

Those two devices are the R6400v2 and R6700v3, and you can get hot-fixes for the holes here. However, some 77 models remain reportedly vulnerable, and no fixes are available. For the full list of Netgear SOHO products said to be at-risk, see the afore-linked page.

Exploit code, developed by infosec outfit Grimm, is available on GitHub for all the models said to be vulnerable: it opens telnet daemon on port 8888, if successful. There’s technical details here.

The bugs lie in the web-based control panel of the Linux-powered equipment. It can be hijacked by sending it specially crafted data, bypassing the password protection, via the local network, or the internet if it is exposed to the world, or by tricking a victim into opening a webpage that automatically connects to the device on the LAN. Once exploited, the device can be commanded to open a backdoor, change its DNS and DHCP settings to redirect users to phishing websites, and so on.

How we got to this situation is an interesting tale. In January, Trend Micro’s Zero-Day Initiative (ZDI) privately contacted Netgear on behalf of a security researcher, called d4rkn3ss, at the Vietnamese government’s national telecoms provider. The egghead had found a way into R6700 routers via a classic buffer overflow attack, and Netgear was informed of the weakness.

ZDI and Netgear eventually agreed on a deadline of June 15 to release any necessary security updates: on that day, ZDI would go public with details of the flaw. At the end of May, Netgear asked for an extension to the end of June. ZDI rejected the request, and on Monday, emitted its advisory.

“This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Netgear R6700 routers,” ZDI explained. “Authentication is not required to exploit this vulnerability.

“The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.”

Since it’s remote code execution, you can completely take over the router.

Speaking to The Register, ZDI senior manager of vulnerability analysis Abdul-Aziz Hariri said: “Since authentication is not required to reach this bug, anyone who can connect to the local network of the router would be capable of exploiting this vulnerability. Since it’s remote code execution, you can completely take over the router.

“In most scenarios, the attacker would be able to possibly upload a custom backdoor software and establish persistence or launch further attacks, like man-in-the-middle attacks.”

While ZDI waited for Netgear to release its patches, Grimm privately reported to Netgear in May it had found the same security hole in a bunch of the manufacturer’s products. When ZDI went public, so did Grimm: publishing an in-depth advisory showing how to exploit the holes, and released full, working proof-of-concept exploit code.

Three days later, Netgear released the aforementioned hot-fixes for two of the models. “We have already provided hot fixes for the R7000 and the R6700. The rest are forth coming,” the router-maker told The Register on Thursday.

The Grimm team noted that Netgear’s firmware lacked basic protections, such as ASLR for its programs, which makes the bugs in the equipment easy to exploit.

Source: Netgear was told in January its routers can be hacked and hijacked. This week, first patches released – after exploits, details made public • The Register

And this is why responsible disclosure is a good idea.

Massive spying on users of Google’s Chrome shows new security weakness

A newly discovered spyware effort attacked users through 32 million downloads of extensions to Google’s market-leading Chrome web browser, researchers at Awake Security told Reuters, highlighting the tech industry’s failure to protect browsers as they are used more for email, payroll and other sensitive functions.

Alphabet Inc’s (GOOGL.O) Google said it removed more than 70 of the malicious add-ons from its official Chrome Web Store after being alerted by the researchers last month.

[,,,]

Most of the free extensions purported to warn users about questionable websites or convert files from one format to another. Instead, they siphoned off browsing history and data that provided credentials for access to internal business tools.

Based on the number of downloads, it was the most far-reaching malicious Chrome store campaign to date, according to Awake co-founder and chief scientist Gary Golomb.

Google declined to discuss how the latest spyware compared with prior campaigns, the breadth of the damage, or why it did not detect and remove the bad extensions on its own despite past promises to supervise offerings more closely.

It is unclear who was behind the effort to distribute the malware. Awake said the developers supplied fake contact information when they submitted the extensions to Google.

“Anything that gets you into somebody’s browser or email or other sensitive areas would be a target for national espionage as well as organized crime,” said former National Security Agency engineer Ben Johnson, who founded security companies Carbon Black and Obsidian Security.

The extensions were designed to avoid detection by antivirus companies or security software that evaluates the reputations of web domains, Golomb said.

If someone used the browser to surf the web on a home computer, it would connect to a series of websites and transmit information, the researchers found. Anyone using a corporate network, which would include security services, would not transmit the sensitive information or even reach the malicious versions of the websites.

“This shows how attackers can use extremely simple methods to hide, in this case, thousands of malicious domains,” Golomb said.

After this story’s publication, Awake released its research, including the list of domains and extensions. here

All of the domains in question, more than 15,000 linked to each other in total, were purchased from a small registrar in Israel, Galcomm, known formally as CommuniGal Communication Ltd.

Awake said Galcomm should have known what was happening.

In an email exchange, Galcomm owner Moshe Fogel told Reuters that his company had done nothing wrong.

“Galcomm is not involved, and not in complicity with any malicious activity whatsoever,” Fogel wrote. “You can say exactly the opposite, we cooperate with law enforcement and security bodies to prevent as much as we can.”

[…]

Malicious developers have been using Google’s Chrome Store as a conduit for a long time. After one in 10 submissions was deemed malicious, Google said in 2018 here it would improve security, in part by increasing human review.

But in February, independent researcher Jamila Kaya and Cisco Systems’ Duo Security uncovered here a similar Chrome campaign that stole data from about 1.7 million users. Google joined the investigation and found 500 fraudulent extensions.

Source: Exclusive: Massive spying on users of Google’s Chrome shows new security weakness – Reuters

Google isn’t even trying to not be creepy: ‘Continuous Match Mode’ in Assistant will listen to everything until it’s disabled

Google has introduced “continuous match mode” for apps on its voice-powered Assistant platform, where it will listen to everything without pausing. At the same time it has debuted related developer tools, new features, and the ability to display web content on its Smart Display hardware using the AMP component framework.

The Chocolate Factory has big plans for its voice assistant. “We consider voice to be the biggest paradigm shift around us,” said director of product Baris Gultekin, speaking at the Voice Global summit, where the new features were introduced.

The goal is “ambient computing”, where you can interact with the big G anywhere at any time, so pervasively that you do not notice it. Voice interaction is a key part of this since it extends the ability to perform searches or run applications to scenarios where tapping a keyboard or touching a display are not possible.

Google Assistant exists in many guises such as on smartphones and watches, TVs, PCs, and also on dedicated hardware, such as the voice-only Google Home and Google Home Mini, or with “smart display” screens on the Google Nest Hub or devices from Lenovo and Harman. While assistant devices have been popular, Android phones (which nag you to set up the Assistant) must form the largest subset of users. Over all the device types, the company claims over 500 million active users.

[…]

Actions Builder will “replace DialogFlow as the preferred way to develop actions on the assistant,” said Shodjai.

Google's new Action Builder at work

Google’s new Action Builder at work

Trying out the new Action Builder, we discovered that running an action under development is impossible if you have the Web and App Activity permission, which lets Google keep a record of your actions, disabled. A dialog appears prompting you to enable it. It is a reminder of how Google Assistant is entwined with the notion that you give Google your data in return for personalised experiences.

[…]

“Sometimes you want to build experiences that enable the mic to remain open, to enable users to speak more naturally with your action, without waiting for a change in mic states,” said Shodjai at the summit and in the developer post.

“Today we are announcing an early access program for Continuous Match Mode, which allows the assistant to respond immediately to user’s speech enabling more natural and fluid experiences. This is done transparently, so that before the mic opens the assistant will announce, ‘the mic will stay open temporarily’, so users know they can now speak freely without waiting for additional prompts.”

The mode is not yet publicly documented. The demonstrated example was for a game with jolly cartoon pictures; but there may be privacy implications since in effect this setting lets the action continue to listen to everything while the mode is active.

Shodjai did not explain how users will end a Continuous Match Mode session but presumably this will be either after a developer-defined exit intent, or via a system intent as with existing actions. Until that happens, the action will be able to keep running.

Just as with personalisation via tracking and data collection, privacy and pervasive computing do not sit comfortably together, and with the new Continuous Match Mode a little more privacy slips away.

Source: Google isn’t even trying to not be creepy: ‘Continuous Match Mode’ in Assistant will listen to everything until it’s disabled • The Register

Groundbreaking Technology Allows 3D Tissues To Be Printed Directly Into Human Body

LOS ANGELES — The world of 3D printing has come so far that scientists can actually produce biological products like bone, skin and blood vessels. Of course, there are numerous safety risks involved in using 3D-printed body parts in human patients. There is progress on that front, though. Scientists have developed a method for printing body parts that will make procedures involving 3D-printed tissues much safer.

Typically, when scientists print tissues, they transplant them into their patients after being printed. Thanks to a research team led by researchers at the Terasaki Institute, tissues can now be printed directly into a patient’s body.

[…]

“This bio-ink formulation is 3D printable at physiological temperature, and can be crosslinked safely using visible light inside the body.” says first author Ali Asghari Adib, Ph.D, in a media release.

Like squeezing icing onto a cake

Researchers also created a groundbreaking 3D-printing nozzle and an “interlocking” printing technique to use with their bio-ink. Bio-ink can be squeezed through the nozzle of the printer like cake icing is squeezed through a tube. The nozzle also punctures the tissue it’s about to print on so some bio-ink can fill the gaps the nozzle created and serve as an anchor for the 3D-printed tissue

“The interlocking mechanism enables stronger attachments of the scaffolds to the soft tissue substrate inside the patient body,” adds Asghari Adib.

Source: Groundbreaking Technology Allows 3D Tissues To Be Printed Directly Into Human Body – Study Finds

New Technique Allows 3D Printing of Flexible Materials using droplets

Engineers at the University of California, Davis, have developed a new approach to 3D printing that allows printing of finely tuned flexible materials. By using a droplet-based, multiphase microfluidic system, the team was able to efficiently print materials with potential applications in soft robotics, tissue engineering and wearable technology. The work is published June 15 in the Proceedings of the National Academy of Sciences.

In traditional extrusion-based 3D printers, printing material is pushed through a nozzle and added to the structure repeatedly until the product is complete. While this is efficient and cost-effective, it makes it hard to print structures made of more than one material, and getting the right amount of softness can be challenging.

Jiandi Wan, assistant professor of chemical engineering at UC Davis, noticed that this nozzle was similar to the glass capillary microfluidic devices that his lab studies. These devices have multiple nozzles placed inside of each other.

“Most extrusion-based 3D printers use very simple nozzles and since we had already developed these glass microfluidics, we thought, ‘why not apply it to 3D printing?’” said Wan.

Wan, UC Davis graduate student Hing Jii Mea and Luis Delgadillo, University of Rochester, developed a device that uses a multiphase drip system to encapsulate droplets of a water-based solution containing polyethylene glycol diacrylate, or PEGDA, inside of a common silicon-based organic polymer called polydimethylsiloxane, or PDMS. The PDMS flows around a dripper, which makes tiny droplets of the PEGDA that it evenly inserts into the PDMS as both materials flow onto the structure that’s being printed.

The resulting structure looks like a Pac-Man maze, with little dots of PEGDA droplets surrounded by PDMS. Once the PEGDA diffuses out of the droplets, it chemically softens the PDMS, making the structure more flexible.

“You can also encapsulate other chemicals in the droplets to make the overall matrix much softer or harder,” Wan said.

Structure flexibility can be tuned

The team also showed that droplet-based 3D printing can be used to produce flexible porous objects, and constructs with encapsulated polymer particles and metal droplets. In addition, structure flexibility can be easily tuned by changing the droplet size and flow rate. This gives researchers a wide range of options to truly design their structure and vary flexibility to fit their needs in a way that’s difficult with the conventional nozzle-based method.

Though microfluidic-based 3D printing has been done before, Wan’s group is the first to use this droplet-based multiphase emulsion approach. The team is already looking into potential applications and learning what other combinations of materials they can use to change the mechanical or chemical properties of 3D printed products. They think the work could have applications in bioprinting and wearable electronics, like smart fabrics.

“I think this will open a new area of research, since applying the established microfluidics technology to 3D printing represents a new direction to go,” he said.

Media contact(s)

Jiandi Wan, Chemical Engineering, jdwan@ucdavis.edu

Andy Fell, News and Media Relations, 530-752-4533, ahfell@ucdavis.edu

Media Resources

Source: New Technique Allows 3D Printing of Flexible Materials | UC Davis

3d Printing tissue inside the body

Abstract

We develop and characterize a biomaterial formulation and robotic methods tailored for intracorporeal tissue engineering (TE) via direct-write (DW) 3D printing. Intracorporeal TE is defined as the biofabrication of 3D TE scaffolds inside of a living patient, in a minimally invasive manner. A biomaterial for intracorporeal TE requires to be 3D printable and crosslinkable via mechanisms that are safe to native tissues and feasible at physiological temperature (37 °C). The cell-laden biomaterial (bioink) preparation and bioprinting methods must support cell viability. Additionally, the biomaterial and bioprinting method must enable the spatially accurate intracorporeal 3D delivery of the biomaterial, and the biomaterial must adhere to or integrate into the native tissue. Current biomaterial formulations do not meet all the presumed intracorporeal DW TE requirements. We demonstrate that a specific formulation of gelatin methacryloyl (GelMA)/Laponite®/methylcellulose (GLM) biomaterial system can be 3D printed at physiological temperature and crosslinked using visible light to construct 3D TE scaffolds with clinically relevant dimensions and consistent structures. Cell viability of 71-77% and consistent mechanical properties over 21 days are reported. Rheological modifiers, Laponite® and methylcellulose, extend the degradation time of the scaffolds. The DW modality enables the piercing of the soft tissue and over-extrusion of the biomaterial into the tissue, creating a novel interlocking mechanism with soft, hydrated native tissue mimics and animal muscle with a 3.5-4 fold increase in the biomaterial/tissue adhesion strength compared to printing on top of the tissue. The developed GLM biomaterial and robotic interlocking mechanism pave the way towards intracorporeal TE.

Source: Direct-write 3D printing and characterization of a GelMA-based biomaterial for intracorporeal tissue engineering – IOPscience