Language Selection

English French German Italian Portuguese Spanish

Microsoft

Proprietary and Openwashing: Facebook. Skype, LinkedIn, Talend, and Slack

Filed under
Microsoft

Angelfire

Filed under
Microsoft
Security

Today, August 31st 2017, WikiLeaks publishes documents from the Angelfire project of the CIA. Angelfire is an implant comprised of five components: Solartime, Wolfcreek, Keystone (previously MagicWand), BadMFS, and the Windows Transitory File system. Like previously published CIA projects (Grasshopper and AfterMidnight) in the Vault7 series, it is a persistent framework that can load and execute custom implants on target computers running the Microsoft Windows operating system (XP or Win7).

Solartime modifies the partition boot sector so that when Windows loads boot time device drivers, it also loads and executes the Wolfcreek implant, that once executed, can load and run other Angelfire implants. According to the documents, the loading of additional implants creates memory leaks that can be possibly detected on infected machines.

Keystone is part of the Wolfcreek implant and responsible for starting malicious user applications. Loaded implants never touch the file system, so there is very little forensic evidence that the process was ever ran. It always disguises as "C:\Windows\system32\svchost.exe" and can thus be detected in the Windows task manager, if the operating system is installed on another partition or in a different path.

BadMFS is a library that implements a covert file system that is created at the end of the active partition (or in a file on disk in later versions). It is used to store all drivers and implants that Wolfcreek will start. All files are both encrypted and obfuscated to avoid string or PE header scanning. Some versions of BadMFS can be detected because the reference to the covert file system is stored in a file named "zf".

The Windows Transitory File system is the new method of installing AngelFire. Rather than lay independent components on disk, the system allows an operator to create transitory files for specific actions including installation, adding files to AngelFire, removing files from AngelFire, etc. Transitory files are added to the 'UserInstallApp'.

Read more

Bugs? What bugs? Microsoft sees no evil.

Filed under
Microsoft

On Aug. 23, Microsoft released Windows 10 Fall Creators Update Build 16273. This late beta doesn’t introduce new features. It’s all about stabilizing the next Windows 10 update before releasing it to the public. In short, it’s a bug-fix version — with a twist. While Microsoft tells us which bugs have been fixed in this build, it doesn’t say anything about new bugs, or old bugs that haven’t been fixed.

Read more

Microsoft Openwashing of Visual Studio and LinkedIn

Filed under
Microsoft

Desktop: Entroware's New GNU/Linux Laptop, Microsoft Caught Red-handed

Filed under
GNU
Linux
Microsoft

Openwashing: Oracle, Mono, Microsoft and Red Hat

Filed under
Microsoft
  • Oracle Open Source Library now available to C and C++ developers [Ed: openwashing of a link to Oracle's proprietary lockin]

    The production release of the Oracle Database Programming Interface for C (ODPI-C), which gives more streamlined access to C and C++ developers to Oracle Database, has been launched on GitHub.

    The open-source wrapper is aimed primarily at language interface developers, allowing users to quickly call more common features of the Oracle Call Interface (OCI), the main C API for Oracle Database. But the company says that its conciseness makes it a flexible and accessible tool.

  • Mono 5.2 Released With Various Changes [Ed: Microsoft lockin painted as "open"]
  • Microsoft's .NET Core 2.0: What's new and why it matters
  • Microsoft Launches .NET Core 2.0 With Better Linux Support
  • Tips for finding partners open enough to work with you

    Imagine I'm working on the front line of an open organization, and I'm committed to following principles like transparency, inclusivity, adaptability, collaboration, community, accountability, and commitment to guide that front-line work. A huge problem comes up. My fellow front-line workers and I can't handle it on our own, so we discuss the problem and decide that one of us has to take it to top management. I'm selected to do that.

    When I do, I learn there is nothing we can do about the problem within the company. So management decides to let me present the issue to outside individuals who can help us.

    In my search for the expertise required to fix the problem, I learned that no single individual has that expertise—and that we must find an outside, skilled partner (company) to help us address the issue.

Slackware Security and Windows Insecurity

Filed under
Microsoft
Security
Slack
  • OpenJDK7 and Flash Player security updates (Aug ’17)

    On the blog of IcedTea release manager Andrew Hughes (aka GNU/Andrew) you can find the announcement for IcedTea 2.6.11 which builds OpenJDK 7u151_b01. This release includes the official July 2017 security fixes for Java 7. Note that the security updates for Java 8 were already pushed to my repository some time ago.

  • Kremlin's hackers 'wield stolen NSA exploit to spy on hotel guests in Europe, Mid East'

    Miscreants are using various techniques, including the leaked NSA EternalBlue exploit also wielded by the WannaCry malware, to hack into laptops and other devices used by government and business travelers, FireEye researchers declared on Friday.

Microsoft Hardware Woes

Filed under
Hardware
Microsoft

Dumbo

Filed under
Microsoft
Security

Today, August 3rd 2017 WikiLeaks publishes documents from the Dumbo project of the CIA. Dumbo is a capability to suspend processes utilizing webcams and corrupt any video recordings that could compromise a PAG deployment. The PAG (Physical Access Group) is a special branch within the CCI (Center for Cyber Intelligence); its task is to gain and exploit physical access to target computers in CIA field operations.

Dumbo can identify, control and manipulate monitoring and detection systems on a target computer running the Microsoft Windows operating sytem. It identifies installed devices like webcams and microphones, either locally or connected by wireless (Bluetooth, WiFi) or wired networks. All processes related to the detected devices (usually recording, monitoring or detection of video/audio/network streams) are also identified and can be stopped by the operator. By deleting or manipulating recordings the operator is aided in creating fake or destroying actual evidence of the intrusion operation.

Dumbo is run by the field agent directly from an USB stick; it requires administrator privileges to perform its task. It supports 32bit Windows XP, Windows Vista, and newer versions of Windows operating system. 64bit Windows XP, or Windows versions prior to XP are not supported.

Read more

Syndicate content

More in Tux Machines

TUXEDO InfinityBook Pro 13 Is the First Laptop Preloaded with openSUSE Leap 15

The OpenSuSE Project announced today that openSUSE Leap 15 is available for download as 64-bit installation images, which users would need to write on USB flash drives or DVDs to install the operating system on their personal computers. However, the openSUSE Leap 15 operating system also comes preloaded with the TUXEDO InfinityBook Pro 13 laptop we reviewed last year and Linode cloud images. "Today’s public release of Leap 15 aren’t only released as DVD and Network ISO: Linode and hardware vendor TUXEDO Computers have cloud images through of Leap ready, too. While the brand new TUXEDO InfinityBook Pro 13 is immediately available with Leap 15 preinstalled and ready-to-run, Linode has Leap available for all infrastructure needs," said openSUSE Project's Douglas DeMaio in today's announcement. Read more

Android Leftovers

Thunderbolt Networking Now Supported in Linux's NetworkManager Tool

Implemented by Intel developer Mika Westerberg last year during the development of the Linux 4.15 kernel series, Thunderbolt networking arrived for Linux-based operating systems to enable peer-to-peer (P2P) network connections where you connect two computers directly via a certified Thunderbolt cable to transfer files. But while the implementation was there in the Linux kernel, the userspace bits were missing to make Thunderbolt networking work on a standard installation of a GNU/Linux distribution. By adding a new udev rule in the NetworkManager the two developers managed to load the thunderbolt-net kernel module. Read more

Based on Enterprise Code, Tested Millions of Times: openSUSE Leap 15 released

Today’s major release of openSUSE Leap 15 is offering professional users, entrepreneurs and ISVs (Independent Software Vendors) a new, fresh and hardened code base for their workloads that supports modern hardware, based on a stable, community- and enterprise-based open-source GNU/Linux distribution – but developed with a modern, more secure, better tested and much more open open-source build system unique to SUSE and openSUSE. Read more Also: openSUSE Leap 15 Officially Released, Based on SUSE Enterprise Linux 15 OpenSUSE Leap 15 Released, Based On SUSE Linux Enterprise 15 OpenSUSE Conference 2018 Kicks Off In Prague, Video Streams Available