This Week In Security: ISNs, Patch Tuesday, And Clubhouse

Let’s talk TCP. Specifically, how do the different TCP connections stay distinct, and how is a third party kept from interrupting a connection? One of the mechanisms that help accomplish this feat is the TCP sequence number. Each of the two endpoints of a TCP connection tracks an incrementing 32-bit number, corresponding to the bytes sent in the connection. It’s handy, because each side can use that value to track what parts of the data stream they have received. On missing packets, a message can be sent requesting bytes 7-15 to be resent, for instance.

Each side of the connection sets their own Initial Sequence Number (ISN), and it’s important that this number is unique, as collisions can cause stream confusion. That statement should make your security spidey sense tingle. If a collision can cause problems when it happens by chance, what can a hacker do with it intentionally? Potentially quite a bit. Knowing the current sequence number, as well as a couple other pieces of information, a third party can close a TCP stream or even inject data. The attack has been around for years, originally known as the Mitnick Attack. It was originally possible because TCP implementations used a simple counter to set the ISN. Once the security ramifications of this approach were understood, the major implementations moved to a random number generation for their ISNs.

Now to this week’s story: researchers at Forescout took the time to check 11 TCP/IP stacks for vulnerability to the old Mitnick Attack (PDF Whitepaper). Of the eleven embedded stacks texted, nine have serious weaknesses in their ISN generation. Most of the vulnerable implementations use a system time value as their ISN, while several use a predictable pseudorandom algorithm that can be easily reversed.

CVEs have been assigned, and vendors notified of “NUMBER:JACK”, Forescout’s name for the research. Most of the vulnerable software already has patches available. The problem with embedded systems is that they often never get security updates. The vulnerable network stacks are in devices like IP cameras, printers, and other “invisible” software. Time will tell if this attack shows up as part of a future IoT botnet.
Continue reading “This Week In Security: ISNs, Patch Tuesday, And Clubhouse”

Internet Of Clams

Sensors aren’t just limited to the electrical, mechanical, or chemical realm. Up until 1986, canaries were used as Carbon Monoxide detectors, and food tasters are still used by some heads of state. These so-called sentinel species have been known and used for decades if not centuries. But recent projects using clams to detect water pollution are providing real-time electronic feedback. They are using the species Actinonaias ligamentina, which, as you no doubt recall, was declared “Mussel of the Month” by the University of Wisconsin’s MUSSEL Project back in January 2010. They are more commonly known as mucket clams or mucket mussels, and are particularly sensitive to water pollution — they will clam-up, so to speak, in the presence of contaminated water.

Clam Sensor Wiring Mississippi River Project

Several municipalities along the Mississippi River installed clam-based sensors back in 2015, and another system was installed in the Anacostia River Estuary in 2011. Polish director Julia Pekla produced a documentary about the clam-based sensors installed at the Dębiec Water Treatment Plant on the Wisła River near Warsaw which has been in operation since 1994. Her documentary is titled “Gruba Kaśka (Fat Kathy)” and won the In Vivo Award at the 2020 Imagine Science Film’s 13th annual film festival (see trailer below).

As shown in the lead photo, a simple electrical contact is mounted on each clam, which closes a circuit with the base contact when the shell is clamped shut. The systems along the Mississippi River use multiple clams, 11 in Minneapolis Minnesota and 16 in Moline Illinois. The system in Poland uses eight clams — when four or more clams are in agreement the system automatically shuts down and alerts the operators. These clams only work for three months, after which they are put into retirement with a mark so they won’t be required to serve again.

We’ve written about a clam-shaped underwater sensor before, and also reported on the potential of using clams as batteries. This biological sensing technique came to our attention via [Embedded FM podcast #357].

Continue reading “Internet Of Clams”

Ender V2 Layer Shift Problem Rectified With Cooling

Released in early 2020, the Creality Ender V2 is a popular desktop 3D printer in the maker market. However, some users began having problems with machines ordered in the latter half of the year, with repeated layer shifts occuring during long prints. After much investigation, it appears a fix has been found.

After much experimentation by [Fountain_of_Wisdom], it was determined that layer shifts were occuring at the same time as loud thumps or knocks from the printer. This was often during long X or Y traversals, and when these noises occurred, the print head would shift slightly, perpendicular to the axis of travel. Further investigation led to suspicion of the drive signals to the stepper motors, and it was then determined that the driver chips were becoming excessively hot during long prints. The solution landed upon was to install a fan and improve venting to cool the driver electronics, which curtailed the layer shift problem entirely.

However, such problems aren’t the norm, and since then, owners of the affected units with version 4.2.2 motherboards have been advised to upgrade to version 4.2.7. The exact root cause of the problem is not clear, but we’ve seen earlier Ender models upgraded with newer stepper drivers before; perhaps a similar fix is what makes the later revision motherboard a winner in the V2. If you’ve got insight into the problem, sound off in the comments!

[Thanks to Prodigity for the tip!]

Trouble With The Texas Power Grid As Cold Weather Boosts Demand, Knocks Out Generators

It comes as something of a shock that residents of the Lone Star State are suffering from rolling power blackouts in the face of an unusually severe winter. First off, winter in Texas? Second, isn’t it the summer heat waves that cause the rolling blackouts in that region?

Were you to mention Texas to a European, they’d maybe think of cowboys, oil, the hit TV show Dallas, and if they were European Hackaday readers, probably the semiconductor giant Texas Instruments. The only state of the USA with a secession clause also turns out to to have their own power grid independent of neighboring states.

An accurate and contemporary portrait of a typical Texan, as understood by Europeans. Carol M. Highsmith, Public domain.
An accurate and contemporary portrait of a typical Texan, as understood by Europeans. Carol M. Highsmith, Public domain.

Surely America is a place of such resourcefulness that this would be impossible, we cry as we watch from afar the red squares proliferating across the outage map. It turns out that for once the independent streak that we’re told defines Texas may be its undoing. We’re used to our European countries being tied into the rest of the continental grid, but because the Texan grid stands alone it’s unable to sip power from its neighbours in times of need.

Let’s dive into the mechanics of maintaining an electricity grid, with the unfortunate Texans for the moment standing in as the test subject.

 

Continue reading “Trouble With The Texas Power Grid As Cold Weather Boosts Demand, Knocks Out Generators”

The Rotary-X Engine Is A Revolution In Thermodynamics

If you’re running an army, chances are good that you need a lot of portable power for everything from communications to weapons control systems. When it comes to your generators, every ounce counts. The smaller and lighter you can get them, the better.

Connecticut-based company LiquidPiston is developing a high-powered generator for the US Army that uses the company’s own rotary x-engine — a small, light, and powerful beast that sounds like a dream come true. It can run on gasoline, diesel, natural gas, kerosene, or jet fuel, and is scalable from 1 to 1,000 horsepower (PDF).

Co-founder and CEO Alex Schkolnik describes the design as a combination of the best parts of the Otto and Atkinson cycle engines, the Diesel, and the Wankel rotary while solving the big problems of the latter two. That sounds impressive, but it doesn’t mean much unless you understand how each of these engines work and what their various advantages and disadvantages are. So let’s take a look under the hood, shall we?

Continue reading “The Rotary-X Engine Is A Revolution In Thermodynamics”

MIT Prints Robots With Lasers

MIT’s Computer Science and Artificial Intelligence Lab (CSAIL) wants to convert laser cutters into something more. By attaching a head to a commercial laser cutter and adding software, they combine the functions of a cutter, a conductive printer, and a pick and place system. The idea is to enable construction of entire devices such as robots and drones.

The concept, called LaserFactory, sounds like a Star Trek-style replicator, but it doesn’t create things like circuit elements and motors. It simply picks them up, places them, and connects them using silver conductive ink. You can get a good idea of how it works by watching the video below.

Continue reading “MIT Prints Robots With Lasers”

This Week In Security: Morse Code Malware, Literal And Figurative Watering Holes, And More

Code obfuscation has been around for a long time. The obfuscated C contest first ran way back in 1984, but there are examples of natural language obfuscation from way earlier in history. Namely Cockney rhyming slang, like saying “Lady from Bristol” instead of “pistol” or “lump of lead” instead of “head”. It’s speculated that Cockney was originally used to allow the criminal class to have conversations without tipping off police.

Code obfuscation in malware serves a similar purpose — hiding from security devices and applications. There are known code snippets and blacklisted IP addresses that anti-malware software scans for. If that known bad code can be successfully obfuscated, it can avoid detection. This is a bit of a constant game of cat-and-mouse, as the deobfuscation code itself eventually makes the blacklist. This leads to new obfuscation techniques, sometimes quite off the wall. Well this week, I found a humdinger of an oddball approach. Morse Code.

Yep, dots and dashes. The whole attack goes like this. You receive an email, claiming to be an invoice. It’s a .xlsx.hTML file. If you don’t notice the odd file extension, and actually let it open, you’re treated to a web page. The source of that page is a very minimal JS script that consists of a morse code decoder, and a payload encoded in Morse. In this case, the payload is simply a pair of external scripts that ask for an Office 365 login. The novel aspect of this is definitely the Morse Code. Yes, our own [Danie] covered this earlier this week, but it was too good not to mention here. Continue reading “This Week In Security: Morse Code Malware, Literal And Figurative Watering Holes, And More”