$60 PC Oscilloscope Review

Owning an oscilloscope is a real gamechanger and these days, scopes are more capable and less expensive than ever before. However, there is a big difference between scopes that cost several hundred dollars which are usually quite good and many of the very inexpensive — below $100 — instruments that are often — but not always — little more than toys. [Adrian] looks at a PC-based scope from Hantek that costs about $60. Is it a toy? Or a useful tool? He answers the question in the video below.

The Hantek 6022BE sports two channels with a 20 MHz bandwidth and 48 million samples per second. The device included probes, too. Of course, you also need a PC, although there is apparently third-party software for Android if you don’t want to lug a laptop around.

Continue reading “$60 PC Oscilloscope Review”

Pre-exploded PSU close-up: shown is inductor with the heatsink it shorted against.

The Little Replacement PSU That Could: Kill A Microsoft Surface And Monitor

Recently [Big Clive], everyone’s favorite purveyor of anything electronic that’s dodgy, cheap, cheerful, decidedly crispy or any combination thereof, got sent a very dead external power supply unit. Being clearly a third-party PSU with poorly written and many (likely not truthful) safety approval markings on its label, this PSU had the dubious honor of having destroyed a Microsoft Surface computer as well as the monitor that was connected at the time.

In [Clive]’s video (also embedded after the break) the black and very crispy board is examined, showing a wealth of vaporized traces and plenty of soot. What’s however most fascinating is the failure mode: instead of something obvious like e.g. the main transformer between the primary and secondary side failing, here it would seem that an inductor (see heading image) on the secondary side had its insulation rubbed off and shorted on a nearby heatsink. A heatsink that just happened to be also electrically connected on the primary (mains-level) side.

Judging by the former owner’s report and aftermath, this led to a very sudden and violent demise of the PSU, with mains power very likely making its way into the unsuspecting Surface system and connected monitor. The number of ‘very nope’ design decisions made in this PSU are astounding, and a lesson for both aspiring EEs and anyone considering getting a ‘cheap’ third-party replacement PSU.

(Thanks to [Helge] for the tip)

Continue reading “The Little Replacement PSU That Could: Kill A Microsoft Surface And Monitor”

Filament Dry Box Design Goes Way Over The Top

There’s a fine line between simple feature creep and going over the top when it comes to project design. It’s hard to say exactly where that line is, but we’re pretty sure that this filament dry box has at least stepped over it, and might even have erased it entirely.

Sure, we all know the value of storing 3D printer filament under controlled conditions, to prevent the hygroscopic plastics from picking up atmospheric moisture. But [Sasa Karanovic] must really, REALLY hate the printing artifacts that result. Starting with a commercially available dry box that already had a built-in heating element, [Sasa] took it to the next level by replacing the controller and display with an ESP32. He added a fan to improve air circulation inside the enclosure and prevent stratification, as well as temperature and humidity sensors. Not satisfied with simply switching the heating element on and off at specific setpoints, he also implemented a PID loop to maintain a constant temperature. And of course, there’s a web UI and an API available for third-party control and monitoring.

The video below details [Sasa]’s design thoughts and goes into some detail on construction and performance. And while we may kid that this design is over-the-top, what really comes through is that this is a showcase for design ideas not only for one application, but for hardware projects in general. There are certainly simpler heated dry box designs, and zero-cost solutions as well, but sometimes going overboard has its own value too.

Continue reading “Filament Dry Box Design Goes Way Over The Top”

A Zhengbang Pick&Place machine, with a Virustotal 53/69 result and "53 security vendors and 1 sandbox flagged this file as mailcious" crudely overlaid on top of the image

Zhengbang Pick & Places Your Confidential Data In The Bag, Slowly

Isn’t it convenient when your pick-and-place machine arrives with a fully-set-up computer inside of it? Plug in a keyboard, mouse and a monitor, and you have a production line ready to go. Turns out, you can have third parties partake in your convenience by sharing your private information with them – as long as you plug in an Ethernet cable! [Richard] from [RM Cybernetics] has purchased a ZhengBang ZB3245TSS machine, and in the process of setting it up, dutifully backed up its software onto a USB stick – as we all ought to.

This bit of extra care, often missed by fellow hackers, triggered an antivirus scanner alert, and subsequently netted some interesting results on VirusTotal – with 53/69 result for a particular file. That wasn’t conclusive enough – they’ve sent the suspicious file for an analysis, and the test came back positive. After static and dynamic analysis done by a third party, the malware was confirmed to collect metadata accessible to the machine and send it all to a third-party server. Having contacted ZhengBang about this mishap, they received a letter with assurances that the files were harmless, and a .zip attachment with replacement “clean” files which didn’t fail the antivirus checks.

It didn’t end here! After installing the “clean” files, they also ran a few anti-malware tools, and all seemed fine. Then, they plugged the flash drive into another computer again… to encounter even more alerts than before. The malware was equipped with a mechanism to grace every accessible .exe with a copy of itself on sight, infecting even .exe‘s of the anti-malware tools they put on that USB drive. The article implies that the malware could’ve been placed on the machines to collect your company’s proprietary design information – we haven’t found a whole lot of data to support that assertion, however; as much as it is a plausible intention, it could have been a case of an unrelated virus spread in the factory. Surprisingly, all of these discoveries don’t count as violations of Aliexpress Terms and Conditions – so if you’d like to distribute a bunch of IoT malware on, say, wireless routers you bought in bulk, now you know of a platform that will help you!

This goes in our bin of Pretty Bad News for makers and small companies. If you happen to have a ZhengBang pick-and-place machine with a built-in computer, we recommend that you familiarize yourself with the article and do an investigation. The article also goes into details on how to reinstall Windows while keeping all the drivers and software libraries working, but we highly recommend you worry about the impact of this machine’s infection spread mechanisms, first.

Supply chain attacks, eh? We’ve seen plenty of these lately, what’s with communities and software repositories being targeted every now and then. Malware embedded into devices from the factory isn’t a stranger to us, either – at least, this time we have way more information than we did when Supermicro was under fire.

Editor’s Note: As pointed out by our commenters, there’s currently not enough evidence to assert that Zhengbang’s intentions were malicious. The article has been edited to reflect the situation more accurately, and will be updated if more information becomes available.

Editor’s Note Again: A rep from Zhengbang showed up in the comments and claims that this was indeed a virus that they picked up and unintentionally passed on to the end clients.

This Week In Security: NetUSB, HTTP.sys, And 2013’s CVE Is Back

Let’s imagine a worst case situation for home routers. It would have to start with a port unintentionally opened to the internet, ideally in a popular brand, like Netgear. For fun, let’s say it’s actually a third-party kernel module, that is in multiple router brands. This module would then need a trivial vulnerability, say an integer overflow on the buffer size for incoming packets. This flaw would mean that the incoming data would write past the end of the buffer, overwriting whatever kernel data is there. So far, this exactly describes the NetUSB flaw, CVE-2021-45608.

Because red teams don’t get their every wish, there is a catch. While the overflow is exceptionally easy to pull off, there isn’t much wiggle room on where the data gets written. There’s no remote code execution Proof of Concept (PoC) yet, and [Max Van Amerongen], who discovered the flaw, says it would be difficult but probably not impossible to pull off. All of this said, it’s a good idea to check your router for open ports, particularly non-standard port numbers. If you have a USB port on your router, check for updates.

Windows HTTP.sys Problem

A serious problem has been announced in Windows Server 2019 and Windows 10, with some versions vulnerable in their default configurations. The problem is in how Windows handles HTTP Trailer packets, which contain extra information at the end of normal HTTP transfers. There is a PoC available that demonstrates a crash. It appears that an additional information leak vulnerability would have to be combined with this one to produce a true exploit. This seems to be a different take on CVE-2021-31166, essentially exploiting the same weakness, and working around the incomplete fix. This issue was fixed in the January patch set for Windows, so make sure you’re covered. Continue reading “This Week In Security: NetUSB, HTTP.sys, And 2013’s CVE Is Back”

KiCAD 6.0: What Made It And What Didn’t

I’ve been following the development of KiCAD for a number of years now, and using it as my main electronics CAD package daily for a the last six years or thereabouts, so the release of KiCAD 6.0 is quite exciting to an electronics nerd like me. The release date had been pushed out a bit, as this is such a huge update, and has taken a little longer than anticipated. But, it was finally tagged and pushed out to distribution on Christmas day, with some much deserved fanfare in the usual places.

So now is a good time to look at which features are new in KiCAD 6.0 — actually 6.0.1 is the current release at time of writing due to some bugfixes — and which features originally planned for 6.0 are now being postponed to the 7.0 roadmap and beyond. Continue reading “KiCAD 6.0: What Made It And What Didn’t”

Canon Temporarily Abandons Smart Ink Cartridges

An unexpected side effect of the global semiconductor shortage came to light this week — Japanese printer manufacturer Canon announced they are temporarily going to provide consumable ink and toner cartridges without microchips. Furthermore, they provided instructions for consumers on how to bypass the printer’s logic, allowing it to function even when it incorrectly thinks the ink or toner is low. Included in the announcement (German), the company stated what most people already knew:

There is no negative impact on print quality when using consumables without electronic components.

It’s well known that many printer companies make their profit on the consumable cartridges rather than the printers themselves. And most printers require consumers to only use factory original cartridges, a policy enforced by embedded security ICs. Use a third-party ink cartridge and your printer will likely refuse to print. There are legitimate concerns about poor quality inks damaging the print heads. But with reports like this 2003 one from the BBC noting that 17% to 38% additional good quality pages can be printed after the consumable is declared “empty”, and that the price per milliliter of inks is seven times the cost of vintage champagne, one can reasonably conclude that these DRM-protected consumables are more about on ensuring profits than protecting the hardware.

For now, this announcement applies to German customers, and covers the Canon imageRunner family of multi-function printers (the complete list is in the company announcement above).