This Week In Security: Rackspace Falls Over, Poison Ping, And The WordPress Race

In what’s being described as a Humpty-Dumpty incident, Rackspace customers have lost access to their hosted Exchange service, and by extension, lots of archived emails. The first official word of trouble came on December 2nd, and it quickly became clear that this was more than the typical intern-tripped-over-the-cable incident. Nearly a week later, Rackspace confirmed what observers were beginning to suspect, it was a ransomware attack. There’s not a lot of other answers yet, and the incident FAQ answers are all variations on a theme.

Our investigation into the incident is ongoing and will take time to complete. To ensure the integrity of the ongoing investigation, we do not have additional details to share at this time.

Knowing the security issues that have plagued Microsoft Exchange over the last couple of months, one has to wonder if Rackspace was breached as a result of the PowerShell problems. What’s staggering is that a week after the incident, Rackspace still has no timeline for service restoration.

Rackspace isn’t the only major ransomware attack this week, as a hospital in Versailles has partially shut down due to another ransomware attack. Operations were canceled, and work has to be done the old fashioned way, without the network to support.

Continue reading “This Week In Security: Rackspace Falls Over, Poison Ping, And The WordPress Race”

All About USB-C: Introduction For Hackers

We’ve now had at least five years of USB-C ports in our devices. It’s a standard that many manufacturers and hackers can get behind. Initially, there was plenty of confusion about what we’d actually encounter out there, and manufacturer-induced aberrations have put some people off. However, USB-C is here to stay, and I’d like to show you how USB-C actually gets used out there, what you can expect out of it as a power user, and what you can get out of it as a hobbyist.

Modern devices have a set of common needs – they need a power input, or a power output, sometimes both, typically a USB2 connection, and often some higher-speed connectivity like a display output/input or USB 3. USB-C is an interface that aims to be able to take care of all of those. Everything aforementioned is optional, which is a blessing and a curse, but you can quickly learn to distinguish what to expect out of a device based on how it looks; if ever in doubt, I’d like to show you how to check.

Continue reading “All About USB-C: Introduction For Hackers”

Building Your Own Consensus

With billions of computers talking to each other daily, how do they decide anything? Even in a database or server deployment, how do the different computers that make up the database decide what values have been committed? How do they agree on what time it is? How do they come to a consensus?

But first, what is the concept of consensus in the context of computers? Boiled down, it is for all involved agents to agree on a single value. However, allowances for dissenting, incorrect, or faulting agents are designed into the protocol. Every correct agent must answer, and all proper agents must have the same answer. This is particularly important for data centers or mesh networks. What happens if the network becomes partitioned, some nodes go offline, or the software crashes weirdly, sending strange garbled data? One of the most common consensus algorithms is Raft. Continue reading “Building Your Own Consensus”

Two landline phones connected to a set of wires and boards

How To Build Your Own Analog Phone Network

Analog phones may be nearly obsolete today, but having served humanity for well over a century they’re quite likely to pop up in drawers or attics now and then. If you’ve got a few of them lying around and you think it’d be cool to hook them up and make your own local telephone system, check out [Gadget Reboot]’s latest work. His video series shows all the steps towards making a fully-functional wired phone system.

Of course, dedicated phone exchanges for home or small business use are not hard to find, but [Gadget Reboot] decided it would be way more interesting to design his own system from the ground up. To begin with, he used off-the-shelf subscriber line interface circuits (SLICs) to implement the correct voltages, currents and impedances to drive analog phones. He then added a DTMF decoder chip to allow the phone to dial a number, and hooked up both systems to an ESP8266 which controls the entire system. It implements the different states of picking up, dialing, ringing and hanging up, and also generates the corresponding audio signals.

The system becomes even more interesting through the implementation of a multi-exchange layout, just like in large-scale phone systems: when a number is dialled that’s connected to a different exchange, then a connection must be made between two exchanges in order to complete the call. Large-scale systems use dedicated protocols like SS7, but [Gadget Reboot] preferred to keep things simple and used an RS-485 connection. The two ESPs check each others status and if everything’s in order, a relay connects the two lines and the circuit is completed.

The current system is a bit of a mess of wires, but it works, and [Gadget Reboot] plans to make a cleaner setup based on custom circuit boards, possibly expanding it with functions like modem support. In any case it’s already way more advanced than a simple electromechanical system. Want to know more about classic phone networks? We’ve got you covered.

Continue reading “How To Build Your Own Analog Phone Network”

Scramblepad Teardown Reveals Complicated, Expensive Innards

What’s a Scramblepad? It’s a type of number pad in which the numbers aren’t in fixed locations, and can only be seen from a narrow viewing angle. Every time the pad is activated, the buttons have different numbers. That way, a constant numerical code isn’t telegraphed by either button wear, or finger positions when punching it in. [Glen Akins] got his hands on one last year and figured out how to interface to it, and shared loads of nice photos and details about just how complicated this device was on the inside.

Just one of the many layers inside the Scramblepad.

Patented in 1982 and used for access control, a Scramblepad aimed to avoid the risk of someone inferring a code by watching a user punch it in, while also preventing information leakage via wear and tear on the keys themselves. They were designed to solve some specific issues, but as [Glen] points out, there are many good reasons they aren’t used today. Not only is their accessibility poor (they only worked at a certain height and viewing angle, and aren’t accessible to sight-impaired folks) but on top of that they are complex, expensive, and not vandal-proof.

[Glen]’s Scramblepad might be obsolete, but with its black build, sharp lines, and red LED 7-segment displays it has an undeniable style. It also includes an RFID reader, allowing it to act as a kind of two-factor access control.

On the inside, the reader is a hefty piece of hardware with multiple layers of PCBs and antennas. Despite all the electronics crammed into the Scramblepad, all by itself it doesn’t do much. A central controller is what actually controls door access, and the pad communicates to this board via an unencrypted, proprietary protocol. [Glen] went through the work of decoding this, and designed a simplified board that he plans to use for his own door access controller.

In the meantime, it’s a great peek inside a neat piece of hardware. You can see [Glen]’s Scramblepad in action in the short video embedded below.

Continue reading “Scramblepad Teardown Reveals Complicated, Expensive Innards”

Number Stations Gone Wild

[Ringway Manchester] has an interest in numbers stations. These mysterious stations send presumably coded numbers or other coded information. However, it is rare that anyone claims credit for these stations. Normally they operate with military-like precision, adhering to strict operating schedules and sending out their messages error-free. [Ringway] looks at five times when things didn’t go as planned for these spy stations.

Perhaps it isn’t surprising, however, as machines have likely replaced human operators. That makes them prone to errors when the computers go awry. Many of the errors are ones of frequency, where two number stations wind up transmitting at once. We suppose spies all use the same few frequencies. Some, however, also had computers go haywire and start going through the alphabet which, of course, could have been part of some secret message protocol, but appeared more likely to be a simple mistake.

We were amused, though, to hear the story of a Czech spy station that not only had a licensed call sign but would send QSL cards to people who reported reception. Perhaps they didn’t get the memo about secrecy!

We’ve listened to a few number stations in our time. If you don’t have a suitable antenna, you can always try hunting them online. But don’t expect to catch them making any mistakes.

Continue reading “Number Stations Gone Wild”

RFID Sticker On Bike Helmet Grants Garage Access

[Glen] might describe his project of opening his garage door by way of an RFID sticker on his bike helmet as simple, but some of the interfacing he needed to do was quite complex. He walks through the project from beginning to end, and there’s plenty to learn from.

When designing an RFID access control system, one has to decide what kind of reader and what kind of tags one wishes to use. They all function more or less the same way, but there are a lot of practical considerations to take into account such as cost, range, ease of use, and security options. After a lot of research, [Glen] decided on inexpensive sticker-style tags and a compatible reader supporting credentials with an ISO14443 UID that could be suitably mounted on a building’s exterior.

The actual opening of the door was the simple part, done by interfacing to a spare remote.

Breakout boards with ready-to-use code libraries exist for some RFID readers, but that wasn’t the case for the reader [Glen] had. He ended up rolling his own code to handle communication with the reader, with a Microchip PIC18F45K50 doing all the work of reading tags and performing access control. His code is on the project’s GitHub repository, and if you also find yourself needing to interface to a reader that uses the Wiegand protocol, you might want to give it a look.

Controlling the actual garage door was the easy part. All that took was soldering two wires across the switch contacts of a spare garage door opener remote, and using a relay to close the contacts. Simple and effective. You can see it in action in the short video, embedded below the break.

Overhead door access control might be a simple concept, but it comes in all shapes and sizes when enterprising hackers start looking for solutions. We’ve seen garage doors given the DIY IoT treatment, and even seen access controlled by a car’s headlamp flashes, which actually turned out to be more secure than it sounds.

Continue reading “RFID Sticker On Bike Helmet Grants Garage Access”