(g+) Security: Sicher bezahlen mit Quantenkryptogramm

Österreichische Forscher haben ein neues Quantenprotokoll für sichere Bezahlvorgänge im Internet entwickelt. Erste Tests im Labor sind erfolgreich verlaufen. Ein Bericht von Dirk Eidemüller (Datensicherheit, Verschlüsselung)

Österreichische Forscher haben ein neues Quantenprotokoll für sichere Bezahlvorgänge im Internet entwickelt. Erste Tests im Labor sind erfolgreich verlaufen. Ein Bericht von Dirk Eidemüller (Datensicherheit, Verschlüsselung)

IT-Teams: Nörgler, Besserwisser, Prokrastinierer

Mit den meisten Entwicklern lässt sich gut arbeiten, aber manche Charaktere sind einfach … schwierig. Ein kleiner Leitfaden, um mit ihnen umzugehen. Ein Erfahrungsbericht von Vadim Kravcenko (Arbeit, Softwareentwicklung)

Mit den meisten Entwicklern lässt sich gut arbeiten, aber manche Charaktere sind einfach ... schwierig. Ein kleiner Leitfaden, um mit ihnen umzugehen. Ein Erfahrungsbericht von Vadim Kravcenko (Arbeit, Softwareentwicklung)

qBittorrent Web UI Exploited to Mine Cryptocurrency: Here’s How to Fix

qBittorrent is one of the most popular torrent clients around but taking time to properly configure security surrounding its web interface shouldn’t be overlooked. A combination of unchanged default credentials and UPnP settings allowed an attacker to install Monero mining software on a user’s PC. Fortunately the dangers are mitigated with a few easy but crucial steps.

From: TF, for the latest news on copyright battles, piracy and more.

qbittorrent-logoWhile BitTorrent client functionality hasn’t fundamentally changed over the past 20 years, developers of leading clients haven’t let their software stagnate.

A good example is the excellent qBittorrent, a feature-rich open source client which still receives regular updates. In common with similar clients, qBittorent can be found on GitHub along with its source and installation instructions.

Elsewhere on the same platform, users were recently trying to work out how a standard qBittorrent install suddenly led to the appearance of unwanted cryptocurrency mining software on the same machine.

Proxmox and LXC

For those unfamiliar with Proxmox VE, it’s an environment for virtual machines that once tried becomes very useful, extremely quickly. It’s also free for mere mortals and in most circumstances, very easy to install and get up and running.

tteck-proxmoxWith help from various Proxmox ‘helper scripts’ offered by tteck on GitHub (small sample to the right), even beginners can install any of dozens of available software packages in a matter of seconds using LXC containers.

Even if none of that makes sense, it doesn’t matter. Those who want qBittorrent installed, for example, can copy and paste a single line of text into Proxmox…and that’s it. Given that the whole process is almost always flawless, user issues are very rare, so to hear of a possible malware infection came as a real shock recently

Cryptominer Discovery

In summary, a Proxmox user deployed a tteck script to install qBittorrent and then a month later found his machine being worked hard by cryptomining software known as xmrig. While he investigated the problem, tteck removed the qBittorrent LXC script as a basic precaution, but it soon became clear that neither Proxmox or tteck’s script had anything to do with the problem.

The unwelcome software was indeed installed maliciously, but due to a series of avoidable events, rather than a genius hack.

When a qBittorrent installation like this completes and the software is launched, access to qBittorent takes place through a web interface accessible from most web browsers. By default, qBittorrent uses port 8080 and since many users like to access their torrent clients from remote networks, qBittorrent uses UPnP (Universal Plug and Play) to automate port forwarding, thereby exposing the web interface to the internet.

qbit-webui

Having this working in record time is all very nice, but that doesn’t mean it’s safe. To ensure that only the operator of the client can access the web interface, qBittorrent allows the user to configure a username and a password for authentication purposes.

This generally means that random passers-by will need to possess these credentials before being able to do damage. In this case, the default admin username and password were not changed and that allowed an attacker to easily access the web interface.

Attacker Told qBittorrent to Run an External Program

To allow users to automate various tasks related to downloading and organizing their files, qBittorrent has a feature that can automatically run an external program when a torrent is added and/or when a torrent is finished.

The options here are limited only by the imagination and skill of the user but unfortunately the same applies to any attacker with access to the client’s web interface.

qbitt-external

In this case the attacker told the qBittorrent client to run a basic script on completion of a torrent. The script accessed the domain http://cdnsrv.in from where it downloaded a file called update.sh and then ran it. The consequences of that are explained in detail by tteck, but the main points are a) unauthorized cryptomining on the host machine and b) the attacker maintaining root access via SSH key authentication.

Easily Avoided

The default admin username for qBittorrent is ‘admin’ while the default password is ‘adminadmin’. Had these common-knowledge defaults been changed following install, the attacker would still have found the web interface but would’ve had no useful credentials for conventional access.

More fundamentally, possession of the correct credentials would’ve had limited value if the qBittorrent client hadn’t used UPnP to expose the web interface in the first place. Taking another step back, if UPnP hadn’t been enabled in the user’s router, qBittorrent would’ve had no access to UPnP, and wouldn’t have been able to forward ports or expose the interface to the internet.

In summary: disable UPnP in the router and only enable it once its function is fully understood and when absolutely necessary. Never leave default passwords unchanged, and if something doesn’t need to be exposed to the internet, don’t expose it unnecessarily.

Finally, it’s worth mentioning that tteck‘s response, to a problem that had nothing to do with Proxmox or his scripts, has been first class. Anyone installing the qBittorrent LXC from here will find the default admin password changed and UPnP disabled automatically.

Any time saved can be spent on automated installs of Plex, Tautulli, Emby, Jellyfin, Jellyseerr, Overseerr, Navidrome, Bazarr, Lidarr, Prowlarr, Radarr, Readarr, Sonarr, Tdarr, Whisparr, and many, many more.

Proxmox: An Open Source Type 1 Hypervisorproxmox-ss

From: TF, for the latest news on copyright battles, piracy and more.

Lilbits: Microsoft kills of WordPad, Lenovo unveils a liquid-cooled gaming laptop, and AMD Ryzen 8050 mobile chip details leaked

Microsoft is pulling the plug on WordPad, the basic word processor that’s been included in Windows for more than two decades. The company has added the app to its list of deprecated features, saying it is “no longer being updated and will …

Microsoft is pulling the plug on WordPad, the basic word processor that’s been included in Windows for more than two decades. The company has added the app to its list of deprecated features, saying it is “no longer being updated and will be removed in a future release of Windows.” In other recent tech news […]

The post Lilbits: Microsoft kills of WordPad, Lenovo unveils a liquid-cooled gaming laptop, and AMD Ryzen 8050 mobile chip details leaked appeared first on Liliputing.

A look into the REM dreams of the animal kingdom

Animals’ “active” sleep phases look very much like REM.

A cuttlefish swims in an aquarium

Enlarge / A cuttlefish swims in an aquarium at the Scientific Center of Kuwait on March 20, 2016, in Kuwait City. (credit: YASSER AL-ZAYYAT/AFP via Getty Images)

Young jumping spiders dangle by a thread through the night, in a box, in a lab. Every so often, their legs curl and their spinnerets twitch—and the retinas of their eyes, visible through their translucent exoskeletons, shift back and forth.

“What these spiders are doing seems to be resembling—very closely—REM sleep,” says Daniela Rössler, a behavioral ecologist at the University of Konstanz in Germany. During REM (which stands for rapid eye movement), a sleeping animal’s eyes dart about unpredictably, among other features.

In people, REM is when most dreaming happens, particularly the most vivid dreams. Which leads to an intriguing question. If spiders have REM sleep, might dreams also unfold in their poppy-seed-size brains?

Read 24 remaining paragraphs | Comments

Apple details reasons to abandon CSAM-scanning tool, more controversy ensues

Safety groups remain concerned about child sexual abuse material scanning and user reporting.

Apple logo obscured by foliage

Enlarge (credit: Leonardo Munoz/Getty)

In December, Apple said that it was killing an effort to design a privacy-preserving iCloud photo scanning tool for detecting child sexual abuse material (CSAM) on the platform. Originally announced in August 2021, the project had been controversial since its inception. Apple first paused it that September in response to concerns from digital rights groups and researchers that such a tool would inevitably be abused and exploited to compromise the privacy and security of all iCloud users. This week, a new child safety group known as Heat Initiative told Apple that it is organizing a campaign to demand that the company “detect, report, and remove” child sexual abuse material from iCloud and offer more tools for users to report CSAM to the company.

Today, in a rare move, Apple responded to Heat Initiative, outlining its reasons for abandoning the development of its iCloud CSAM scanning feature and instead focusing on a set of on-device tools and resources for users known collectively as “Communication Safety” features. The company's response to Heat Initiative, which Apple shared with WIRED this morning, offers a rare look not just at its rationale for pivoting to Communication Safety, but at its broader views on creating mechanisms to circumvent user privacy protections, such as encryption, to monitor data. This stance is relevant to the encryption debate more broadly, especially as countries like the United Kingdom weigh passing laws that would require tech companies to be able to access user data to comply with law enforcement requests.

“Child sexual abuse material is abhorrent and we are committed to breaking the chain of coercion and influence that makes children susceptible to it,” Erik Neuenschwander, Apple's director of user privacy and child safety, wrote in the company's response to Heat Initiative. He added, though, that after collaborating with an array of privacy and security researchers, digital rights groups, and child safety advocates, the company concluded that it could not proceed with development of a CSAM-scanning mechanism, even one built specifically to preserve privacy.

Read 9 remaining paragraphs | Comments