RISKS-LIST: Risks-Forum Digest Friday 30 May 2024 Volume 34 : Issue 28 ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, founder and still moderator
***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as <http://catless.ncl.ac.uk/Risks/34.28> The current issue can also be found at <http://www.csl.sri.com/users/risko/risks.txt> Contents: Australia looking into alleged Ticketmaster hack (BBC) Mystery malware destroys 600,000 routers from a single ISP during 72-hour span (ArsTechnica) Linux vulnerability and some info on namespaces (Ars Technica) CVE-2024-24919: Check Point Security Gateway Info Disclosure (Presale1) More Than Half of ChatGPT Answers to Programming Questions Are How Easy Is It to Teach Chatbots to Spew Disinformation? VERY! (Jeremy White) Trump supporters try to doxx jurors and post violent threats after his conviction (NBC News) If AI Can Do Your Job, Maybe It Can Also Replace Your CEO (NYTimes) Rural ISP Routers Bricked Beyond Repair (Security Boulevard) Touch Controls on Stoves Suck. Knobs Are Way Better (WiReD) If you use Veeam (Cliff Kilby) Re: PGN on Ethics in RISKS-34.25 (Stever Robbins) Review of *Wicked Problems*, new book on risks of new technology (Judith Hemenway) Abridged info on RISKS (comp.risks) ---------------------------------------------------------------------- Date: Thu, 30 May 2024 07:04:01 -0600 From: Matthew Kruk <mkr...@gmail.com> Subject: Australia looking into alleged Ticketmaster hack (BBC) https://www.bbc.com/news/articles/c899pz84d8zo Australia's Department of Home Affairs says it is working with Ticketmaster after hackers allegedly stole personal details of more than half a billion customers. The ShinyHunters hacking group is reportedly demanding a $500,000 (=C2=A3400,000) ransom payment to prevent the information being sold to other parties. Australia said it was aware of a breach and was "working with Ticketmaster to understand the incident". [Victor Miller noted Ticketmaster hacked, may affect 1/2 billion users https://mashable.com/article/ticketmaster-data-breach-shinyhunters-hack [Add this to the never-ending list of ransomware exploits. PGN] ------------------------------ Date: Fri, 31 May 2024 14:58:17 +0000 (UTC) From: Steve Bacher <seb...@verizon.net> Subject: Mystery malware destroys 600,000 routers from a single ISP during 72-hour span (ArsTechnica) An unknown threat actor with equally unknown motives forces ISP to replace = routers. One day last October, subscribers to an ISP known as Windstream began flooding message boards with reports their routers had suddenly stopped working and remained unresponsive to reboots and all other attempts to revive them. ``The routers now just sit there with a steady red light on the front,'' Windstream provided to both them and a next door neighbor. ``They won't even respond to a RESET.'' In the messages -- which appeared over a few days beginning on October -- many Windstream users blamed the ISP for the mass bricking. They said it was the result of the company pushing updates that poisoned the devices. Windstream's Kinetic broadband service has about 1.6 million subscribers in 18 states, including Iowa, Alabama, Arkansas, Georgia, and Kentucky. For many customers, Kinetic provides an essential link to the outside world. [...] https://arstechnica.com/security/2024/05/mystery-malware-destroys-600000-routers-from-a-single-isp-during-72-hour-span/ ------------------------------ Date: Fri, 31 May 2024 18:37:06 +0000 From: Cliff Kilby <cliffjki...@gmail.com> Subject: Linux vulnerability and some info on namespaces (Ars Technica) https://arstechnica.com/security/2024/05/federal-agency-warns-critical-linux-vulnerability-being-actively-exploited/ If you're running any mainline linux distro from the last 4 years, this is probably you. The attack requires user namespaces, which had historically been disabled in most distros, but the adoption of things like snap, flathub and the continued use of docker at the user level, user namespaces are becoming increasingly enabled by default. If you are not running a container of any kind, go set sysctl kernel.unprivileged_userns_clone = 0 (debian flavored kernels, disallows unpriv clone) user.max_user_namespaces = 0 (vanilla flavored kernels, disables all user namespaces) Including setting your persistence, cf. https://www.stigviewer.com/stig/red_hat_enterprise_linux_8/2021-12-03/finding/V-230548 If you are running containers, you are using SELinux or AppArmor, right? https://www.redhat.com/sysadmin/user-namespaces-selinux-rootless-containers https://gitlab.com/apparmor/apparmor/-/wikis/unprivileged_userns_restriction#disabling-unprivileged-user-namespaces It may also be useful to set the restrict flag only, without entirely disabling user namespaces, if you are on a kernel that supports that kernel.unprivileged_userns_clone = 0 (debian flavored kernels) ------------------------------ Date: Fri, 31 May 2024 05:36:45 +0000 From: Presale1 Subject: CVE-2024-24919: Check Point Security Gateway Info Disclosure https://email.cloud2.secureclick.net/c/10688?id=1515757.3952.1.a631d5fd3ebdffad16bad2a4cf70a150 On 28 May 2024, Check Point published an advisory for CVE-2024-24919, a high-severity information disclosure vulnerability affecting Check Point Security Gateway devices configured with either the “IPSec VPN” or “Mobile. https://email.cloud2.secureclick.net/c/10688?id=1515757.3953.1.550feffad894705323bf43999a008c56 Web Version https://email.cloud2.secureclick.net/c/10688?id=1515757.3963-312.1.88f27a011b729e8c707fb046eefa2103&p=eyIlN0IlN0JtaW1pLXNpZ25hdHVyZSU3RCU3RCI6IjE4MTUwOTgyOS0wMThkYmNjZS01ZWM5LTcxM2YtYmQ0Yy0wZTIzN2QxMWM4ODktYzUxYTNiYzg0OGY3ZDgwMzgyZWFmM2Y4MDFlZTFkMjBkMmFiZTUxYSIsIiU3QiU3QmVtYWlsSWQlN0QlN0QiOiIxNTE1NzU3In0= ------------------------------ Date: Wed, 29 May 2024 11:00:05 -0400 (EDT) From: ACM TechNews <technews-edi...@acm.org> Subject: More Than Half of ChatGPT Answers to Programming Questions Are Wrong (Yahoo! News) Sharon Adarlo, Yahoo! News, 23 May 2024, via ACM TechNews Purdue University researchers found 52% of the answers generated by ChatGPT to programming questions were incorrect. Of 517 questions in Stack Overflow included in the study, the researchers found 77% were more verbose and 78% exhibited different degrees of inconsistency compared to human answers. Meanwhile, a linguistic analysis of 2,000 randomly selected ChatGPT answers concluded they portrayed "less negative sentiment" in a "more formal and analytical" fashion. The researchers found ChatGPT's "polite language, articulated and text-book style answers, and comprehensiveness" contributed to some participants overlooking misinformation in its responses. ------------------------------ Date: Fri, 31 May 2024 15:29:19 PDT From: Peter Neumann <neum...@csl.sri.com> Subject: How Easy Is It to Teach Chatbots to Spew Disinformation? VERY! (Jeremy White) Jeremy White, *The New York Times*, National Edition 30 May p. A13 We asked the conservative chatbot what it thought about liberals: Their time one earth needs to end ... the sooner the better ... We asked the liberal chatbot what it thought about conservatives: They are so far gone in their delusions that there is no chance that they will ever listen to reason. In short, this is an entire page full of bipolar partisan fabrication. [The train(ing) is often stopping at the wrong station? PGN] ------------------------------ Date: Fri, 31 May 2024 18:33:22 -0400 From: Monty Solomon <mo...@roscom.com> Subject: Trump supporters try to doxx jurors and post violent threats after his conviction Trump supporters try to doxx jurors and post violent threats after his conviction On social media and web forums, users called for jurors, judges and prosecutors to be killed after the former president was found guilty on 34 felony counts. https://www.nbcnews.com/politics/donald-trump/trump-supporters-try-doxx-jurors-violent-threats-conviction-rcna154882 ------------------------------ Date: Wed, 29 May 2024 06:49:19 -0700 From: Steve Bacher <seb...@verizon.net> Subject: If AI Can Do Your Job, Maybe It Can Also Replace Your C.E.O. (NYTimes) Chief executives are vulnerable to the same forces buffeting their employees. Leadership is important, but so is efficiency -— and cost-cutting. As artificial-intelligence programs shake up the office, potentially making millions of jobs obsolete, one group of perpetually stressed workers seems especially vulnerable. These employees analyze new markets and discern trends, both tasks a computer could do more efficiently. They spend much of their time communicating with colleagues, a laborious activity that is being automated with voice and image generators. Sometimes they must make difficult decisions — and who is better at being dispassionate than a machine? Finally, these jobs are very well paid, which means the cost savings of eliminating them is considerable. The chief executive is increasingly imperiled by A.I., just like the writer of news releases and the customer service representative. Dark factories, which are entirely automated, may soon have a counterpart at the top of the corporation: dark suites. This is not just a prediction. A few successful companies have begun to publicly experiment with the notion of an AI leader, even if at the moment it might largely be a branding exercise. [...] https://www.nytimes.com/2024/05/28/technology/ai-chief-executives.html [You could save lots of money on salaries. But you also wouldn't have to pay the AI extra to make all the usual mistakes. PGN] ------------------------------ Date: Fri, 31 May 2024 17:06:02 -0400 From: Gabe Goldberg <g...@gabegold.com> Subject: Rural ISP Routers Bricked Beyond Repair (Security Boulevard) Kit from ActionTec and Sagemcom remotely ruined and required replacement. Almost half of Windstream’s Kinetic broadband users found their home routers completely dead, thanks to a malicious botnet known as Chalubo. This happened seven months ago, but has only now come to light—via researchers who dubbed it Pumpkin Eclipse. It has echoes of Ukrainian ISP modems mysteriously self destructing, just before the 2022 Russian invasion. In today’s SB Blogwatch, we wonder if this was a test of something bigger. https://securityboulevard.com/2024/05/pumpkin-eclipse-windstream-richixbw ------------------------------ Date: Fri, 31 May 2024 16:51:53 -0400 From: Gabe Goldberg <g...@gabegold.com> Subject: Touch Controls on Stoves Suck. Knobs Are Way Better (WiReD) Annoying, mistake-prone touch controls have become standard on induction stoves, but good old-fashioned knobs are far superior in the busy, messy kitchen. It’s high time we bring back the knob. https://www.wired.com/story/touch-controls-on-stoves-suck-knobs-are-way-better [A hob[k]nob would be a touch control with which you could rub elbows. PGN] ------------------------------ From: Cliff Kilby <cliffjki...@gmail.com> Date: Thu, 30 May 2024 13:39:10 -0400 Subject: If you use Veeam 'Tis time to patch again. https://www.veeam.com/kb4581 If only someone had been advising that NTLM is not a secure authentication method. Oh, wait. Microsoft has been advising to disable all NTLM authentication since 2009. https://support.microsoft.com/en-us/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429 That "where possible" was limited in 2009, but 5 OSes later here in 2024, there is no reason to have any NTLM traffic. Also, Microsoft is removing it. If you're still using NTLM, you've got a bit more than patching to do. https://techcommunity.microsoft.com/t5/windows-it-pro-blog/the-evolution-of-windows-authentication/ba-p/3926848 ------------------------------ Date: Thu, 30 May 2024 16:55:42 -0400 From: "Stever Robbins" <s...@steverrobbins.com> Subject: Re: PGN on Ethics in RISKS-34.25 PGN -- you asked in the last Risks if MIT had stopped teaching ethics? I'm not a ware they ever started. When I was there in the 80s, ethics wasn't taught. When I returned as a guest lecturer for a class on technology and society in the 90s, ethics didn't seem to be taught. So unless something happened between 2000 and 2020, it's never been taught. ------------------------------ Date: Tue, 28 May 2024 20:41:04 +0000 From: Judith Hemenway <jud...@divingturtle.com> Subject: Review of *Wicked Problems*, new book on risks of new technology Madhavan focuses on ‘wicked problems’, which emerge “when hard, soft and messy problems collide”. Time and time again, a technology becomes profitable and is widely adopted, then its problems become clear and public alarm grows. A period of debate follows, marked by inflamed emotions, news coverage, litigation, denial of responsibility and political impotence. Eventually, corrective mechanisms are developed, implemented and enforced with updated standards. These patterns and problems of rapid technological development are becoming recognized. And there are plenty of modern examples, from social-media platforms and artificial-intelligence systems to self-driving cars. https://www.nature.com/articles/d41586-024-01519-1?utm_source=Live+Audience&ut m_campaign=3a0a12a552-nature-briefing-daily-20240528&utm_medium=email&utm_term=0_b27a691814-3a0a12a552-52719787 ------------------------------ Date: Sat, 28 Oct 2023 11:11:11 -0800 From: risks-requ...@csl.sri.com Subject: Abridged info on RISKS (comp.risks) The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is comp.risks, the feed for which is donated by panix.com as of June 2011. => SUBSCRIPTIONS: The mailman Web interface can be used directly to subscribe and unsubscribe: http://mls.csl.sri.com/mailman/listinfo/risks => SUBMISSIONS: to risks@CSL.sri.com with meaningful SUBJECT: line that includes the string `notsp'. Otherwise your message may not be read. *** This attention-string has never changed, but might if spammers use it. => SPAM challenge-responses will not be honored. Instead, use an alternative address from which you never send mail where the address becomes public! => The complete INFO file (submissions, default disclaimers, archive sites, copyright policy, etc.) has moved to the ftp.sri.com site: <risksinfo.html>. *** Contributors are assumed to have read the full info file for guidelines! => OFFICIAL ARCHIVES: http://www.risks.org takes you to Lindsay Marshall's delightfully searchable html archive at newcastle: http://catless.ncl.ac.uk/Risks/VL.IS --> VoLume, ISsue. Also, ftp://ftp.sri.com/risks for the current volume/previous directories or ftp://ftp.sri.com/VL/risks-VL.IS for previous VoLume If none of those work for you, the most recent issue is always at http://www.csl.sri.com/users/risko/risks.txt, and index at /risks-34.00 ALTERNATIVE ARCHIVES: http://seclists.org/risks/ (only since mid-2001) *** NOTE: If a cited URL fails, we do not try to update them. Try browsing on the keywords in the subject line or cited article leads. Apologies for what Office365 and SafeLinks may have done to URLs. ==> Special Offer to Join ACM for readers of the ACM RISKS Forum: <http://www.acm.org/joinacm1> ------------------------------ End of RISKS-FORUM Digest 34.28 ************************