It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Less than a day after Microsoft disclosed one of the most critical Windows vulnerabilities ever, a security researcher has demonstrated how attackers can exploit it to cryptographically impersonate any website or server on the Internet. Researcher Saleem Rashid on Wednesday tweeted images of the video "Never Gonna Give You Up," by 1980s heartthrob Rick Astley, playing on Github.com and NSA.gov. The digital sleight of hand is known as Rickrolling and is often used as a humorous and benign way to demonstrate serious security flaws. In this case, Rashid's exploit causes both the Edge and Chrome browsers to spoof the HTTPS verified websites of Github and the National Security Agency. Brave and other Chrome derivatives, as well as Internet Explorer, are also likely to fall to the same trick. (There's no indication Firefox is affected.)
Rashid's simulated attack exploits CVE-2020-0601, the critical vulnerability that Microsoft patched on Tuesday after receiving a private tipoff from the NSA. As Ars reported, the flaw can completely break certificate validation for websites, software updates, VPNs, and other security-critical computer uses. It affects Windows 10 systems, including server versions Windows Server 2016 and Windows Server 2019. Other versions of Windows are unaffected.
“Fairly terrifying” Other researchers shared the NSA's sense of urgency. "What Saleem just demonstrated is: with [a short] script you can generate a cert for any website, and it's fully trusted on IE and Edge with just the default settings for Windows," Kenn White, a researcher and security principal at MongoDB, said. That's fairly horrifying. It affects VPN gateways, VoIP, basically anything that uses network communications." (I spoke with White before Rashid had demonstrated the attack against Chrome.)
The vulnerability places Windows endpoints at risk to a broad range of exploitation vectors. NSA assesses the vulnerability to be severe and that sophisticated cyber actors will understand the underlying flaw very quickly and, if exploited, would render the previously mentioned platforms as fundamentally vulnerable. The consequences of not patching the vulnerability are severe and widespread. Remote exploitation tools will likely be made quickly and widely available. Rapid adoption of the patch is the only known mitigation at this time and should be the primary focus for all network owners.
originally posted by: Flyingclaydisk
a reply to: SimpleIdea
So I ran a Win10 update this morning (even before reading this), but how do I know the update actually came from Microsoft.com...in light of this vulnerability???
Boy, isn't that spooky!!!
originally posted by: dothedew
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
What that should state, is that:
"The NSA created a backdoor into Windows since they realized they didn't have one, so please update immediately so that the data collection can continue."
Seriously. The NSA just *"Happened"* to find this security flaw out of the kindness of their hearts?
Gimme a break. If you believe this, I have a bridge to sell you.
vulnerability
Former FBI director James Comey admitted back in September 2016 that he always covers his laptop’s webcam with tape after seeing Facebook's CEO Mark Zuckerburg doing the same with his laptop.
I'll take 3 fer the price of two.
originally posted by: dothedew
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
What that should state, is that:
"The NSA created a backdoor into Windows since they realized they didn't have one, so please update immediately so that the data collection can continue."
Seriously. The NSA just *"Happened"* to find this security flaw out of the kindness of their hearts?
Gimme a break. If you believe this, I have a bridge to sell you.
Yes I think to use windows 10 you must agree to the terms and conditions which involve collecting some data about you, so even with no bugs or exploits, it gives Microsoft a lot of data about you. If you use the built in picture viewer it sends some data to Microsoft with each photo you view, and Microsoft even published statistics on how many photos had been viewed on Windows 10 viewer. Someone also found screenshots of what they were looking at on their win10 computer were being sent to Microsoft. It's apparently allowed in the windows 10 terms and conditions people agree to.
originally posted by: Waterglass
What just now? I have been using windows 10 for several years and have been vulnerable from day one.
Sounds interesting, I haven't heard of that, can you post a link that explains how that works? I thought blocking the cameras with tape like Zuckerberg and Comey did would work, but there are two of them on smartphones usually, one on each side of the phone, so I know that needed more tape than the laptop or tablet which usually only has just the one cam.
Has anyone seen their desktop flash at them sort of like a camera flash. I don't now about you but I covered up that camera lens with a sticky note as per recommendations by the FBI several years ago. However, that may be a moot point since the advancement of cell phones they can now just watch you through the entire cell phone screen.
Sounds interesting, I haven't heard of that, can you post a link that explains how that works? I thought blocking the cameras with tape like Zuckerberg and Comey did would work, but there are two of them on smartphones usually, one on each side of the phone, so I know that needed more tape than the laptop or tablet which usually only has just the one cam
Right, so you can cover up the camera lens on either side of the phone and that will work, using tape, finger or whatever.
originally posted by: Waterglass
a reply to: Arbitrageur
Sounds interesting, I haven't heard of that, can you post a link that explains how that works? I thought blocking the cameras with tape like Zuckerberg and Comey did would work, but there are two of them on smartphones usually, one on each side of the phone, so I know that needed more tape than the laptop or tablet which usually only has just the one cam
Good luck I cant find squat. All I know is that the Smart Phone can capture your picture or view whatever the phone is aimed towards from inside the screen.
HOWEVER; in response to your question I looked at my Samsung Galaxy Smart Phone. Just above the Samsung decal on the top of the phone is a rectangular slot. That's the lens. Just put your finger over it when you have the camera set for a reverse image of "you" and you can block it. Success?