Have I Been Pwned goes open source, bags help from FBI • The Register

Have I Been Pwned goes open source, bags help from FBI • The Register


In brief The creator of the Have I Been Pwned (HIBP) website, which alerts you if it turns out your credentials have been swiped and leaked from an account database, has open sourced the project’s internals.

Troy Hunt set up HIBP in 2013, and the dot-com is now said to be getting a billion requests a month. Last year, the man Down Under announced plans to make key portions of the system open source for others to pick up, use, and improve. Now the Pwned Passwords code base is available from GitHub under a BSD three-clause license.

Hunt also said the FBI has offered to feed known compromised passwords into HIBP.

“Their goal here is perfectly aligned with mine and, I dare say, with the goals of most people reading this: to protect people from account takeovers by proactively warning them when their password has been compromised,” he said.

In addition to the code, there’s also a 3D print schematic of the HIBP logo if that interests you.

New DRAM still susceptible to Rowhammer

Google’s Project Zero last week detailed Half-Double, a new Rowhammer-like technique for altering memory that application code shouldn’t otherwise be able to affect – which can lead to privilege escalation and other bad outcomes.

Rowhammer attacks usually involve repeatedly writing to one memory address to change bits in nearby RAM cells. Half Double, developed by Salman Qazi, Yoongu Kim, Nicolas Boichat, Eric Shiu and Mattias Nissler, is able to affect RAM further away, simply put.

“Traditionally, Rowhammer was understood to operate at a distance of one row: when a DRAM row is accessed repeatedly, bit flips were found only in the two adjacent rows,” Team Google explained. “However, with Half-Double, we have observed Rowhammer effects propagating to rows beyond adjacent neighbors, albeit at a reduced strength.”

The Googlers disclosed this info because they believe “it significantly advances the understanding of the Rowhammer phenomenon, and that it will help both researchers and industry partners to work together to develop lasting solutions” to protect systems from malware and rogue users that seek to use Rowhammer effects to hijack computers.

For pity’s sake, patch Fortinet

The FBI has sent out an urgent memo pleading with Fortinet customers to patch their Fortigate installations after miscreants were spotted exploiting vulnerabilities in a firewall belonging to a local government in America. Fixes are available for the abused bugs.

“As of at least May 2021, an advanced persistent threat (APT) actor group almost certainly exploited a Fortigate appliance to access a webserver hosting the domain for a US municipal government,” the Feds warned [PDF]. “The APT actors likely created an account with the username ‘elie’ to further enable malicious activity on the network.”

Horse, meet stable gate

The US Department of Homeland Security has issued a directive regarding the computer network defenses of oil, gas, and hazardous waste pipelines, two weeks after a ransomware attack led to the shutdown of a major American fuel system and panic buying among some citizens.

According to Uncle Sam:

“The cybersecurity landscape is constantly evolving and we must adapt to address new and emerging threats,” said Secretary of Homeland Security Alejandro Mayorkas.

“The recent ransomware attack on a major petroleum pipeline demonstrates that the cybersecurity of pipeline systems is critical to our homeland security. DHS will continue to work closely with our private sector partners to support their operations and increase the resilience of our nation’s critical infrastructure.”

Malware has its finger on the Pulse

In April, Chinese snoops were fingered for exploiting Pulse Connect Secure VPN appliances. Now FireEye’s Mandiant surveillance squad has reported four families of malware abusing the Pulse vulnerabilities, for which patches are available. Intrusions appear to be automated.

“Mandiant Threat Intelligence assesses that Chinese cyber espionage activity has demonstrated a higher tolerance for risk and is less constrained by diplomatic pressures than previously characterized,” it said.

Apply patches as soon as you can. ®



Source link

The post Have I Been Pwned goes open source, bags help from FBI • The Register appeared first on SecuritNEWS.


https://pubads.g.doubleclick.net/gampad/ad?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2YLWZWxu2Asa1A6tZmnq4RAAAAJA&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
https://securitnews.com/have-i-been-pwned-goes-open-source-bags-help-from-fbi-the-register/

Comments

Popular posts from this blog

Hey Rudy and/or the FBI, Pick Up Your Phone

Understanding Where the Internet Isn’t Good Enough Yet

Migrating to hosted Exchange: Do’s and don’ts