The Internet Archive Has Been Hacked

There are a great many organizations out there, all with their own intentions—some selfish, some selfless, some that land somewhere in between. Most would put the Internet Archive in the category of the library—with its aim of preserving and providing knowledge for the aid of all who might call on it. Sadly, as [theresnotime] reports, it appears this grand institution has been hacked.

On Wednesday, users visiting the Internet Archive were greeted with a foreboding popup that stated the following:

Have you ever felt like the Internet Archive runs on sticks and is constantly on the verge of suffering a catastrophic security breach? It just happened. See 31 million of you on HIBP!

The quote appears to refer to Have I Been Pwned (HIBP), a site that collates details of security breaches so individuals can check if their details have been compromised.

According to founder Brewster Kahle, the site was apparently DDOS’d, with the site defaced via a JavaScript library. It’s believed this may have been a polyfill supply chain attack. As for the meat of the hack, it appears the individuals involved made off with usernames, emails, and encrypted and salted passwords. Meanwhile, as Wired reports, it appears Have I Been Pwned first received the stolen data of 31 million users on September 30.

At the time of writing, it appears the Internet Archive has restored the website to some degree of normal operation. It’s sad to see one of the Internet’s most useful and humble institutions fall victim to a hack like this one. As is always the way, no connected machine is ever truly safe, no matter how much we might hope that’s not the case.

[Thanks to Sammy for the tip!]

Wimbledon Goes Automated

When you think of tennis, you probably think of Wimbledon, the All England Club’s famous competition that has run for 147 years. Part of that history has always been line judges who call the ball in or out, sometimes to the ire of players and fans alike. But line judges will be no more at Wimbledon. They are moving to ELC or electronic line calling on all courts in both the main draw and the qualifying tournaments, according to [Tumaini Carayol] writing in The Guardian.

Of course, in 2007, the competition started using “Hawk-Eye,” which allows for review and challenges of the calls. ELC has also been used in other venues, such as the US Open, which has also done away with all line judges.

In fact, the only grand slam tournament that isn’t using ELC now is the French Open. There is some concern, however. The increased availability of line judges will cut down on the demand for new line judges at lesser tournaments. However, these jobs are a common pathway for aspiring chair judges to gain experience and exposure.

According to the Bloomberg video below, the system uses cameras and microphones to keep track of the ball’s position. Other reports say there are 18 cameras and, apparently, the system uses a computer-generated voice to call “out,” “fault,” or “foot fault.”

Apparently, there are some downsides, however. Last month at the US Open, play was halted because the remote office of the technicians operating the ELC system had to evacuate due to a fire alarm.

[Lewin Day] thinks tech will ruin sports. He may be right. Of course, we are more likely to play sports on technology.

Continue reading “Wimbledon Goes Automated”

WiFi Meets LoRa For Long Range

What do you get when you cross WiFi and LoRa? Researchers in China have been doing this, and they call the result WiLo. They claim to get reliable connections over about half a kilometer. Typical WiFi runs 40 to 60 meters, barring any Pringle’s cans or other exotic tricks.

According to [Michelle Hampson] writing in IEEE Spectrum, the researchers manipulated Wi-Fi’s OFDM multiplexing to emulate LoRa’s chirp-spreading signal. The advantage is that existing WiFi hardware can use the protocol to increase range.

Continue reading “WiFi Meets LoRa For Long Range”

This Week In Security: Zimbra, DNS Poisoning, And Perfctl

Up first this week is a warning for the few of us still brave enough to host our own email servers. If you’re running Zimbra, it’s time to update, because CVE-2024-45519 is now being exploited in the wild.

That vulnerability is a pretty nasty one, though thankfully requires a specific change from default settings to be exposed. The problem is in postjournal. This logging option is off by default, but when it’s turned on, it logs incoming emails. One of the fields on an incoming SMTP mail object is the RCPT TO: field, with the recipients made of the to, cc, and bcc fields. When postjournal logs this field, it does so by passing it as a bash argument. That execution wasn’t properly sanitized, and wasn’t using a safe call like execvp(). So, it was possible to inject commands using the $() construction.

The details of the attack are known, and researchers are seeing early exploratory attempts to exploit this vulnerability. At least one of these campaigns is attempting to install webshells, so at least some of those attempts have teeth. The attack seems to be less reliable when coming from outside of the trusted network, which is nice, but not something to rely on.

New Tool Corner

What is that binary doing on your system? Even if you don’t do any security research, that’s a question you may ask yourself from time to time. A potential answer is WhoYouCalling. The wrinkle here is that WYC uses the Windows Event Tracing mechanism to collect the network traffic strictly from the application in question. So it’s a Windows only application for now. What you get is a packet capture from a specific executable and all of its children processes, with automated DNS capture to go along. Continue reading “This Week In Security: Zimbra, DNS Poisoning, And Perfctl”

Voyager 2’s Plasma Spectrometer Turned Off In Power-Saving Measure

The Voyager 2 spacecraft’s energy budget keeps dropping by about 4 Watt/year, as the plutonium in its nuclear power source is steadily dropping as the isotope decays. With 4 Watt of power less to use by its systems per year, the decision was made to disable the plasma spectrometer (PLS) instrument. As also noted by the NASA Voyager 2 team on Twitter, this doesn’t leave the spacecraft completely blind to plasma in the interstellar medium as the plasma wave subsystem (PWS) is still active. The PLS was instrumental in determining in 2018 that Voyager 2 had in fact left the heliosphere and entered interstellar space. The PLS on Voyager 1 had already broken down in 1980 and was turned off in 2007.

After saving the Voyager 1 spacecraft the past months from a dud memory chip and switching between increasingly clogged up thrusters, it was now Voyager 2’s turn for a reminder of the relentless march of time and the encroaching end of the Voyager missions. Currently Voyager 2 still has four active instruments, but by the time the power runs out, they’ll both be limping along with a single instrument, probably somewhere in the 2030s if their incredible luck holds.

This incredible feat was enabled both by the hard work and brilliance of the generations of teams behind the two spacecraft, who keep coming up with new tricks to save power, and the simplicity of the radioisotope generators (RTGs) which keep both Voyagers powered and warm even in the depths of interstellar space.

This Week In Security: Password Sanity, Tank Hacking, And The Mystery 9.9

It looks like there’s finally hope for sane password policies. The US National Institue of Standards and Technology, NIST, has released a draft of SP 800-63-4, the Digital Identity Guideline.

There’s password guidance in there, like “SHALL NOT impose other composition rules (e.g., requiring mixtures of different character types) for passwords” and “SHALL NOT require users to change passwords periodically.” NIST approved passwords must be at least 8 characters long, with a weaker recommendation of at least 15 characters. Security questions like name of first pet get the axe. And it’s strongly recommended that all ASCII and Unicode characters should be acceptable for passwords.

This is definitely moving in the right direction. NIST guidelines are only binding for government services and contractors, though they do eventually get picked up by banks and other industries. So there’s hope for sane password policies eventually.

Tank Hacking

Researchers at Bitsight are interested in infrastructure security, and they opted to take a closer look at Automatic Tank Gauging (ATG) systems. Those are found at gas stations, as well as any other facility that needs automated monitoring of liquids or gasses in a tank. There is an actual ATG message format, originally designed for RS-232 serial, and woefully unprepared for the interconnected present. The protocol allows for an optional security code, but it maxes out at only six alpha-numeric characters.

Among the vulnerabilities getting announced today, we have a pair of CVSS 10 command injection flaws, a quartet of 9.8 authentication bypass flaws, with one of those being a hardcoded credential — AKA a backdoor. The other CVSS9+ flaw is a SQL injection, with a trio of slightly less serious flaws. Continue reading “This Week In Security: Password Sanity, Tank Hacking, And The Mystery 9.9”

British Commuters Get Their WiFi Hacked

As if there weren’t enough worrying global news stories already, today the British press and media have been full of a story involving the public WiFi networks at some major railway stations. Instead of being faced with the usual don’t-be-naughty terms and conditions page, commuters were instead faced with a page that definitely shouldn’t have been there.

Hackaday readers will immediately have guessed what is likely to have happened. This is probably more of a compromise of the page than of the network itself, and, indeed, the BBC are reporting that it may have come via an administrator account at Network Rail’s er… network provider. Fortunately, it seems the intent was to spread a political message rather than malware, so perhaps those travelers got off lightly. The various companies involved have all got the proverbial egg on their faces, and we’re glad we don’t work in the IT department concerned.

Continue reading “British Commuters Get Their WiFi Hacked”