Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
apseudonym
Feb 25, 2011

Boris Galerkin posted:

In totally unrelated news, thanks Bitcoin!

https://blog.redlock.io/cryptojacking-tesla

Can we go back to hackers goatseing people? Cryptojacking doesn't have the same ring to it.

Adbot
ADBOT LOVES YOU

Furism
Feb 21, 2006

Live long and headbang
Will anybody be at the Mobile World Congress next week by any chance? My company has a booth there and trade shows are soul-crushing when you attend them this way. Meeting a Goon would alleviate a bit of that.

Dylan16807
May 12, 2010

Boris Galerkin posted:

:lol: it was picked up on Ars, Motherboard/Vice, and Guru3D. I’m not sure about Guru3D but the other two have tons of readers. Do people still use Guru3D for GPU reviews?

Anyway they posted another update to come clean about what they did.

https://forums.flightsimlabs.com/index.php?/announcement/11-a320-x-drm-what-happened/

Honestly if they would have communicated that at the beginning they might not have pissed off so many people but they didn’t and they have. They’ve flat out admitted to using illegal means to obtain PII of alleged pirates, which they flat out said has helped them build a case against said alleged pirates or help them combat it.

I hope they get hosed now that more “mainstream” media is picking this up. I imagine they knew how relatively small their community was and was just hoping for it to all blow over.

But obtaining the PII of alleged pirates is not what they did. They hacked exactly one person.

I was ready to see the company get ripped apart for their actions, but now that they clarified I don't see the point. Hacking one person, with no direct damage? Is a fine of $10000 per instance plus reparations for any harm caused not good enough?

Potato Salad
Oct 23, 2014

nobody cares


Did Stand Your Cyberground actually pass?

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


Dylan16807 posted:

But obtaining the PII of alleged pirates is not what they did. They hacked exactly one person.

I was ready to see the company get ripped apart for their actions, but now that they clarified I don't see the point. Hacking one person, with no direct damage? Is a fine of $10000 per instance plus reparations for any harm caused not good enough?

Are you one of those people who thinks businesses actually give a poo poo about fines? They knowingly broke the law. They should go to criminal trial.

Absurd Alhazred
Mar 27, 2010

by Athanatos
https://twitter.com/jedisct1/status/966276829748383744

Theris
Oct 9, 2007

Dylan16807 posted:

But obtaining the PII of alleged pirates is not what they did. They hacked exactly one person.

I was ready to see the company get ripped apart for their actions, but now that they clarified I don't see the point. Hacking one person, with no direct damage? Is a fine of $10000 per instance plus reparations for any harm caused not good enough?

They intentionally placed malware on the computers of every customer who downloaded that update. That's corporate death penalty worthy, it doesn't matter if they only actually activated it for one person.

Proteus Jones
Feb 28, 2013



Theris posted:

They intentionally placed malware on the computers of every customer who downloaded that update. That's corporate death penalty worthy, it doesn't matter if they only actually activated it for one person.

I don't understand how this is even a debate. The company hosed up and got caught doing something illegal in most countries.

Thermopyle
Jul 1, 2003

...the stupid are cocksure while the intelligent are full of doubt. —Bertrand Russell

Dylan16807 posted:

But obtaining the PII of alleged pirates is not what they did. They hacked exactly one person.

I was ready to see the company get ripped apart for their actions, but now that they clarified I don't see the point. Hacking one person, with no direct damage? Is a fine of $10000 per instance plus reparations for any harm caused not good enough?

So you'd be OK with them putting test.exe on your computer as long as they promised to never use it?

Boris Galerkin
Dec 17, 2011

I don't understand why I can't harass people online. Seriously, somebody please explain why I shouldn't be allowed to stalk others on social media!

Dylan16807 posted:

But obtaining the PII of alleged pirates is not what they did. They hacked exactly one person.

I was ready to see the company get ripped apart for their actions, but now that they clarified I don't see the point. Hacking one person, with no direct damage? Is a fine of $10000 per instance plus reparations for any harm caused not good enough?

Give me your bank account details. I promise I won’t use it unless your name is “John Smith.”

SnatchRabbit
Feb 23, 2006

by sebmojo
Crossposting from the AWS thread: Has anyone messed around with AWS Lambda functions for penetration testing? My boss asked me to come up with a function to do some penetration testing on our instances, essentially, check to see whether a certain port on a certain instance is open (or maybe ping all ports and return which ones are open?). I'm thinking about using the API gateway and maybe a simple webpage front end that will run the lambda function but I'm open to ideas. I kind of suck with coding in python but this should be a pretty simple. Anyone have any suggestions?

Collateral Damage
Jun 13, 2009

I'm going to install this bomb in your house, but don't worry. I won't detonate it on purpose.

Inept
Jul 8, 2003

Dylan16807 posted:

But obtaining the PII of alleged pirates is not what they did. They hacked exactly one person.

I was ready to see the company get ripped apart for their actions, but now that they clarified I don't see the point. Hacking one person, with no direct damage? Is a fine of $10000 per instance plus reparations for any harm caused not good enough?

lol at giving the benefit of the doubt to a company that they are being honest that they only used it once on someone who was definitely guilty (according to them). Due process is unnecessary regulation you see.

Samizdata
May 14, 2007

Dylan16807 posted:

But obtaining the PII of alleged pirates is not what they did. They hacked exactly one person.

I was ready to see the company get ripped apart for their actions, but now that they clarified I don't see the point. Hacking one person, with no direct damage? Is a fine of $10000 per instance plus reparations for any harm caused not good enough?

So, you really believe all those companies that claim they have never been breached? You really believe they are going to mention all the PII they've "accidentally" received? Also, notice, they go on and on about how they want to nail just one person, but, if they could identify the person that easy to target the password stealer, they wouldn't need it. This was an epically idiotic idea, likely planned by one of those people who look up to and believe the STDH crowd.

mewse
May 2, 2006

Looks like Ormandy turned his attention to uTorrent

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


Pretty tame by our standards. The uTorrent Classic breach only even allows an attacker to see what kind of weird porn you've been torrenting, not compromise your machine.

Dylan16807
May 12, 2010

Thermopyle posted:

So you'd be OK with them putting test.exe on your computer as long as they promised to never use it?

Every program with auto-update is just as dangerous when it comes to the company deciding to do a targeted hack. So while I don't like the current state of computer security, I don't think it actually matters if the malware is bundled in the installer or not.


Inept posted:

lol at giving the benefit of the doubt to a company that they are being honest that they only used it once on someone who was definitely guilty (according to them). Due process is unnecessary regulation you see.

Well that's why I said $10k per instance. Let the police investigate and punish them the appropriate amount. No need to trust them.



Cup Runneth Over posted:

Are you one of those people who thinks businesses actually give a poo poo about fines? They knowingly broke the law. They should go to criminal trial.

Sure, I guess, but the comparable sentence for something like low-value identity theft is probably a misdemeanor and actually less than what I was suggesting.

Bunni-kat
May 25, 2010

Service Desk B-b-bunny...
How can-ca-caaaaan I
help-p-p-p you?

Dylan16807 posted:

Sure, I guess, but the comparable sentence for something like low-value identity theft is probably a misdemeanor and actually less than what I was suggesting.

UK seems to have 10 years per count for their equivalent of felony identity theft, which this would probably count as. EU regulations are likely tougher, but I can't find specifics. So one count for each person who had this installed on their system.

Proteus Jones
Feb 28, 2013



Dylan16807 posted:

Every program with auto-update is just as dangerous when it comes to the company deciding to do a targeted hack. So while I don't like the current state of computer security, I don't think it actually matters if the malware is bundled in the installer or not.


Well that's why I said $10k per instance. Let the police investigate and punish them the appropriate amount. No need to trust them.


Sure, I guess, but the comparable sentence for something like low-value identity theft is probably a misdemeanor and actually less than what I was suggesting.

They violated multiple sections of CFAA in the US. That’s definitely multiple felonies if they pierce the veil. If not, that can accumulate to hugely significant fines for a small company like this.

Potato Salad
Oct 23, 2014

nobody cares


Dylan16807 posted:

Every program with auto-update is just as dangerous when it comes to the company deciding to do a targeted hack. So while I don't like the current state of computer security, I don't think it actually matters if the malware is bundled in the installer or not.


Well that's why I said $10k per instance. Let the police investigate and punish them the appropriate amount. No need to trust them.


Sure, I guess, but the comparable sentence for something like low-value identity theft is probably a misdemeanor and actually less than what I was suggesting.

By any chance, are you a criminal?

Because you're advocating criminal behavior for no good reason.

apseudonym
Feb 25, 2011

Dylan16807 posted:

Every program with auto-update is just as dangerous when it comes to the company deciding to do a targeted hack. So while I don't like the current state of computer security, I don't think it actually matters if the malware is bundled in the installer or not.

You know there's a big gulf in badness between having the capability to do a bad thing and actually doing it?

Dylan16807
May 12, 2010

Avenging_Mikon posted:

UK seems to have 10 years per count for their equivalent of felony identity theft, which this would probably count as. EU regulations are likely tougher, but I can't find specifics. So one count for each person who had this installed on their system.

One count for each person where it ran, I hope you mean. Copying it to all the other machines was stupid but not very meaningful.

And wow, that's pretty harsh. I wish data breeches got even 1% that much punishment.

Dylan16807
May 12, 2010

apseudonym posted:

You know there's a big gulf in badness between having the capability to do a bad thing and actually doing it?

I agree entirely. And I file "putting test.exe on computers but not running it, then deleting it" as capability, not wrongdoing.

Thermopyle
Jul 1, 2003

...the stupid are cocksure while the intelligent are full of doubt. —Bertrand Russell

Dylan16807 posted:

Copying it to all the other machines was stupid but not very meaningful.


That's the very point that makes it meaningful.

I mean, you trust someone who would be so idiotic to actually have access to all your passwords?

Dylan16807
May 12, 2010

Thermopyle posted:

That's the very point that makes it meaningful.

I mean, you trust someone who would be so idiotic to actually have access to all your passwords?

It proves they're stupid, but most companies are stupid. Maybe I just have a much lower opinion of the average software developer than you do. I think most developers are one bad employee decision away from getting my passwords stolen. Whether that's triggering their anti-one-guy malware incorrectly, or falling to a phishing attack and letting hackers control their download server, or a hundred other ways.

My trust level is low, but this incident doesn't push it much lower. I think the actual hacking is the only important thing that happened here.

Anyway I'll shut up now, I think.

(I do hope they get punished. I just think the suitable punishment got a lot smaller when the story changed from "collected all suspected pirate passwords" to "one guy's passwords". Unless they lied in which case hit them even harder.)

Dylan16807 fucked around with this message at 21:40 on Feb 21, 2018

Bunni-kat
May 25, 2010

Service Desk B-b-bunny...
How can-ca-caaaaan I
help-p-p-p you?

Dylan16807 posted:

One count for each person where it ran, I hope you mean. Copying it to all the other machines was stupid but not very meaningful.

And wow, that's pretty harsh. I wish data breeches got even 1% that much punishment.

Pro-tip: installing surveillance bugs is illegal, even if you don't turn them on.

Thermopyle
Jul 1, 2003

...the stupid are cocksure while the intelligent are full of doubt. —Bertrand Russell

Dylan16807 posted:

It proves they're stupid, but most companies are stupid. Maybe I just have a much lower opinion of the average software developer than you do. I think most developers are one bad employee decision away from getting my passwords stolen.

No, I think you're mostly right.

However, I think that most companies should be more harshly punished, not that this company should be punished less.

Daman
Oct 28, 2011
so they claim they had the guy's IP hitting their server, right.

but then they restricted their malware to only run if a pirate serial is inserted. obviously, the cracker wasn't the only one using the keygenned serial if he was giving it out on a forum.

they probably stole more credentials than just that guy. whether they used them, who knows, they only admitted to that crime once. I'm pretty sure they're admitting to stealing creds from multiple people.

Trabisnikof
Dec 24, 2005

Avenging_Mikon posted:

Pro-tip: installing surveillance bugs is illegal, even if you don't turn them on.

Depends on the state, the location, and the capacities.

A audio recording bug in a 1-Party state in a location with no expectation of privacy and permission of the property owner is legal for example.

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


Dylan16807 posted:

I agree entirely. And I file "putting test.exe on computers but not running it, then deleting it" as capability, not wrongdoing.

Except they did run it

Bunni-kat
May 25, 2010

Service Desk B-b-bunny...
How can-ca-caaaaan I
help-p-p-p you?

Trabisnikof posted:

Depends on the state, the location, and the capacities.

A audio recording bug in a 1-Party state in a location with no expectation of privacy and permission of the property owner is legal for example.

It's an EU company. The EU is putting in to action a law that requires users to accept each individual cookie a website wishes to use, each time you visit that site. I would be very surprised if 1-Party recordings were legal by companies.

Potato Salad
Oct 23, 2014

nobody cares


The fact remains that a keylogger was installed on systems and it was absolutely intended to be used.

By the book, that's a sentencing and severe fine.

Inept
Jul 8, 2003

Dylan16807 posted:

I agree entirely. And I file "putting test.exe on computers but not running it, then deleting it" as capability, not wrongdoing.

Nah it's wrongdoing and illegal. This is a dumb argument.

The Iron Rose
May 12, 2012

:minnie: Cat Army :minnie:

Avenging_Mikon posted:

It's an EU company. The EU is putting in to action a law that requires users to accept each individual cookie a website wishes to use, each time you visit that site. I would be very surprised if 1-Party recordings were legal by companies.

:laffo:

the EU continues in their quest to have the most useless and onerous regulatory environment possible

Also no, companies intentionally installing malware on your system is not okay whether it's used or not.

EssOEss
Oct 23, 2006
128-bit approved
Authenticode code signing certificate providers these days all want to sell me dongles that require me to mash a button or provide a password every 24 hours for code signing. I want to sign code in my build servers in a data center, with no human presence.

Where should I turn to for such capabilities? Do the certificate providers offer it? All I see in web searches are dongles. I would be totally happy with, for example, TPM-locked certificates that are equally secure against theft as physical tokens. I just do not want to have a human sitting in my server rack.

Furism
Feb 21, 2006

Live long and headbang

Avenging_Mikon posted:

It's an EU company. The EU is putting in to action a law that requires users to accept each individual cookie a website wishes to use, each time you visit that site. I would be very surprised if 1-Party recordings were legal by companies.

Don't you get it just the once per site, for all the cookies? Or is that a new law because the previous one wasn't annoying enough?

EssOEss
Oct 23, 2006
128-bit approved
Welcome to General Data Protection Regulation, enforced from 25 May 2018. It takes data protection up to eleven across the EU.

GDPR is far more wide-reaching than cookies but here is a decent overview of what it means for cookies:

quote:

Implied consent is no longer sufficient. Consent must be given through a clear affirmative action, such as clicking an opt-in box or choosing settings or preferences on a settings menu. Simply visiting a site doesn’t count as consent.

‘By using this site, you accept cookies’ messages are also not sufficient for the same reasons. If there is no genuine and free choice, then there is no valid consent. You must make it possible to both accept or reject cookies. This means:

It must be as easy to withdraw consent as it is to give it. If organisations want to tell people to block cookies if they don’t give their consent, they must make them accept cookies first.

Sites will need to provide an opt-out option. Even after getting valid consent, sites must give people the option to change their mind. If you ask for consent through opt-in boxes in a settings menu, users must always be able to return to that menu to adjust their preferences.

I do not think it affects individual cookies but it does mean that users need to be explicitly informed about what (exactly!) their data is used for. Just "we use cookies to improve our service" does not cut it anymore.

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

EssOEss posted:

Authenticode code signing certificate providers these days all want to sell me dongles that require me to mash a button or provide a password every 24 hours for code signing. I want to sign code in my build servers in a data center, with no human presence.

Where should I turn to for such capabilities? Do the certificate providers offer it? All I see in web searches are dongles. I would be totally happy with, for example, TPM-locked certificates that are equally secure against theft as physical tokens. I just do not want to have a human sitting in my server rack.

Yeah, any of the CAs can do this with a standard signing cert. The reason that you're seeing these weird, elaborate things is that devs on the whole are absolute dumbfucks that do not understand how handle key material and will either leave it sitting around with the private key completely unencrypted or have it set to something trivial that's written in a text file in the directory of the thing itself. When stuff needs signing (which shouldn't be that often) either train one person on how to do it properly and make it their job or script up some kind of mechanism that allows the devs to drop stuff off in an inject directory and have it get signed for them after some approval workflow. Otherwise you're going to have a million copies of the thing floating around, stored incorrectly. We get ours from Comodo and its been Fine.

Truga
May 4, 2014
Lipstick Apathy
I'm in love with GDPR, it's already generating tears and it's not even in effect yet.

Adbot
ADBOT LOVES YOU

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

EssOEss posted:

Welcome to General Data Protection Regulation, enforced from 25 May 2018. It takes data protection up to eleven across the EU.

GDPR is far more wide-reaching than cookies but here is a decent overview of what it means for cookies:


I do not think it affects individual cookies but it does mean that users need to be explicitly informed about what (exactly!) their data is used for. Just "we use cookies to improve our service" does not cut it anymore.

Peep the penalties for non-compliance too. 4% of global turnover (or 20 million euros, if that's a bigger number) if you don't get free and informed consent before doing something.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply