{"id":13841,"date":"2017-12-20T22:32:04","date_gmt":"2017-12-21T06:32:04","guid":{"rendered":"https:\/\/www.podfeet.com\/blog\/?p=13841"},"modified":"2017-12-21T07:06:30","modified_gmt":"2017-12-21T15:06:30","slug":"sb-12-20-2017","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2017\/12\/sb-12-20-2017\/","title":{"rendered":"Security Bits &#8211; HP Keylogger, Mailsploit"},"content":{"rendered":"<h3>Security Medium 1 \u2014 HP&#8217;s Accidental Keylogger<\/h3>\n<p>Some HP laptops shipped with a keyboard driver from Synaptics in which a developer debugging feature was accidentally left enabled. The effect of this mistake is that the driver has built-in support for logging all keystrokes via WPP (a debugging tool that&#8217;s built into Windows).<\/p>\n<p>This sounds bad, really bad, but thankfully it&#8217;s not actually as bad as it sounds.<\/p>\n<p><!--more--><\/p>\n<p>The driver did not log keystrokes by default, it merely has the ability to do so. To enable the <em>&#8216;feature&#8217;<\/em> (for want of a better word), you need to set a registry key, and only users with administrator access can do that. If you have administrator access, you have the power to install a keyboard logger anyway, so all this does is give malicious admins, (or malware that gets admin access) another alternative to do something they already had the power to do anyway.<\/p>\n<p>It&#8217;s important to note that there&#8217;s absolutely no evidence of malice of any kind here. This really does look like a simply case of human error. IMO, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Hanlon's_razor\">Hanlon&#8217;s Razor<\/a> applies.<\/p>\n<p>The security researcher who found this issue reported it to HP responsibly, and HP have released driver updates for affected models.<\/p>\n<p>While owners of affected laptops shouldn&#8217;t set their proverbial hair on fire, it&#8217;s definitely not a good thing to have a pre-installed keylogger on your laptop, so definitely do update your drivers if you own an affected laptop!<\/p>\n<h4>Links<\/h4>\n<ul>\n<li>HP&#8217;s support article with links to the updated drivers \u2014 <a href=\"https:\/\/support.hp.com\/us-en\/document\/c05827409\">support.hp.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/12\/hp-leaves-accidental-keylogger-in-laptop-keyboard-driver\/\">HP leaves accidental keylogger in laptop keyboard driver \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Security Medium 2 \u2014 <em>MailSploit<\/em><\/h3>\n<p>This isn&#8217;t so much a single bug as a collection of similar bugs relating to the same spec.<\/p>\n<p>The Simple Mail Transfer Protocol (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Simple_Mail_Transfer_Protocol\">SMTP<\/a>) is the protocol used to transport our emails around the world. SMTP is old, very old \u2014 in fact, it dates back to 1982, which is 7 years before Tim Berners Lee invented the world wide web.<\/p>\n<p>Because SMTP is old, the spec only allows for the use of ASCII characters in the <code>from<\/code> mail header. That&#8217;s a problem, because lots of people have names that contain non-ASCII characters (Irish names like Gr\u00e1inne, German surnames like M\u00fcller, etc.). To square that circle, an encoding scheme was developed to allow non-ASCII characters to be represented with ASCII strings. This scheme goes by the highly forgettable moniker RFC&#8211;1342, and was released way back in 1992. For example, you can use RFC&#8211;1342 to encode <code>Gr\u00e1inne<\/code> as <code>Gr=C3=A1inne<\/code>, and <code>M\u00fcller<\/code> as <code>M=C3=BCller<\/code>.<\/p>\n<p>You might imagine that a specification so old would be well implemented by now, but that&#8217;s where you&#8217;d be wrong. What security researchers discovered is that lots of mail apps and web mail services have code that does a really bad job of processing RFC&#8211;1342-encoded mail headers. The mistakes, and their consequences, vary from app to app and from webmail service to webmail service, but in general, the most common problem is from-address spoofing leading to spam filter bypasses, but in a few cases, the result is cross site scripting or arbitrary code execution.<\/p>\n<p>Sabri Haddouche, the security researcher behind this work, is maintaining a Google Docs spreadsheet outlining the current status of a whole load of common mail clients and webmail services \u2014 <a href=\"https:\/\/docs.google.com\/spreadsheets\/d\/1jkb_ZybbAoUA43K902lL-sB7c1HMQ78-fhQ8nowJCQk\/edit#gid=0\">docs.google.com\/\u2026<\/a><\/p>\n<p>Thankfully, for most people the only effect here will be spam filter bypasses, and they&#8217;ll get fixed over time with server and software updates. To figure out how you&#8217;re affected, check the Google doc for your mail software, and\/or webmail provider. Even if there&#8217;s no patch yet, if you&#8217;re only affected by spoofing, don&#8217;t panic, it&#8217;s not ideal, but it&#8217;s not a calamity.<\/p>\n<h4>Links<\/h4>\n<ul>\n<li>The bug&#8217;s home page (because that&#8217;s a thing these days) \u2014 <a href=\"https:\/\/www.mailsploit.com\/index\">www.mailsploit.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/11\/mailsploit-using-emails-to-attack-mail-software\/\">Mailsploit: using emails to attack mail software \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>Online RFC&#8211;1342 encoder &amp; decoder \u2014 <a href=\"http:\/\/www.webatic.com\/run\/convert\/qp.php\">www.webatic.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Notable Security Updates<\/h3>\n<ul>\n<li>December&#8217;s Patch Tuesday has been and gone with critical security updates for Windows, Edge, Office, Exchange, and Flash \u2014 <a href=\"https:\/\/krebsonsecurity.com\/2017\/12\/patch-tuesday-december-2017-edition\/\">krebsonsecurity.com\/\u2026<\/a><\/li>\n<li>Apple surprises everyone with updated firmware for their apparently abandoned Airport line of routers. The update includes a fix for the KRACK WiFi vulnerability \u2014 <a href=\"http:\/\/tidbits.com\/article\/17683\">tidbits.com\/\u2026<\/a> &amp; <a href=\"https:\/\/www.macobserver.com\/news\/product-news\/apple-patches-krack-airport-firmware-updates\/\">www.macobserver.com\/\u2026<\/a><\/li>\n<li>As promised, Apple released iOS &amp; tvOS updates to address the HomeKit vulnerability we talked about in the previous Security Bits \u2014 <a href=\"http:\/\/tidbits.com\/article\/17685\">tidbits.com\/\u2026<\/a> &amp; <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-ios-11-2-1-tvos-11-2-1-and-more-with-security-fixes\/\">www.intego.com\/\u2026<\/a><\/li>\n<li>Google have released their December Android update \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/14\/whats-in-your-androids-december-security-update\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Notable News<\/h3>\n<ul>\n<li>&#x1f1fa;&#x1f1f8; As expected, the FCC have voted to effectively end net neutrality \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/15\/fcc-repeals-net-neutrality\/\">nakedsecurity.sophos.com\/\u2026<\/a>\n<li>FCC Chairman Ajit Pai explains what you can still do after net neutrality is gone &#8211; in the most insulting video Allison has ever seen &#8211; <a href=\"https:\/\/www.youtube.com\/watch?v=JqONIPwidQw\" target=\"_blank\" rel=\"noopener\">youtube.com\/&#8230;<\/a>\n<ul>\n<li>A clear, simple, and understandable explanation of the back-story behind this controversial decision from the people behind the NPR Planet Money podcast \u2014 <a href=\"https:\/\/www.npr.org\/sections\/money\/567724614\/the-indicator\">www.npr.org\/\u2026<\/a><\/li>\n<li>An interactive map showing how many broadband providers are available at each US address \u2014 <a href=\"https:\/\/www.mapbox.com\/labs\/net-neutrality\/\">www.mapbox.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>&#x1f1eb;&#x1f1f7; France&#8217;s government privacy watch dog CNIL has ordered that sharing of WhatsApp data with Facebook stop, and the company has been given one month to comply before fines start being levied \u2014 <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2017-12-18\/whatsapp-given-1-month-ultimatum-to-stop-facebook-data-transfers\">www.bloomberg.com\/\u2026<\/a> &amp; <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/20\/whatsapp-and-facebook-told-to-stop-sharing-data\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Suggested Reading<\/h3>\n<ul>\n<li>PSAs, Tips &amp; Advice\n<ul>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/krebsonsecurity.com\/2017\/12\/buyers-beware-of-tampered-gift-cards\/\">Buyers Beware of Tampered Gift Cards \u2014 krebsonsecurity.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-touch-id-vs-face-id\/\">Apple Security: Touch ID vs. Face ID \u2014 www.intego.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/ten-things-about-website-code-everyone-should-know\">10 things about website code everyone should know \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/fifteen-terminal-tricks-every-mac-user-should-know\">15 Terminal commands that every Mac user should know \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/hour-code-upon-us-heres-how-get-started\">Missed Hour of Code? Learn to program with these helpful guides! \u2014 www.imore.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Notable Breaches &amp; Privacy Violations\n<ul>\n<li><a href=\"https:\/\/www.macobserver.com\/news\/hacked-password-database-found-contain-1-4-billion-credentials\/\">Hacked Password Database Found to Contain 1.4 Billion Credentials \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>News\n<ul>\n<li>&#x1f1fa;&#x1f1f8; <a href=\"https:\/\/www.theverge.com\/2017\/12\/11\/16761742\/american-express-signatures-credit-card-purchases-no-more\">American Express is getting rid of signatures for credit card purchases \u2014 www.theverge.com\/\u2026<\/a><\/li>\n<li>A bad few weeks for Uber:\n<ul>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/13\/massive-uber-data-scraping-and-secret-servers-exposed-in-waymo-suit\/\">Massive Uber data scraping and secret servers exposed in Waymo suit \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/18\/doj-confirms-uber-is-under-criminal-investigation\/\">DOJ confirms Uber is under criminal investigation \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/12\/spies-are-watching-on-linkedin\/\">Spies are watching\u2026 on LinkedIn \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/krebsonsecurity.com\/2017\/12\/mirai-iot-botnet-co-authors-plead-guilty\/\">Mirai IoT Botnet Co-Authors Plead Guilty \u2014 krebsonsecurity.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Opinion &amp; Analysis\n<ul>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/krebsonsecurity.com\/2017\/12\/the-market-for-stolen-account-credentials\/\">The Market for Stolen Account Credentials \u2014 krebsonsecurity.com\/\u2026<\/a> (recommended by Allison)<\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/www.imore.com\/are-vpn-app-developers-selling-your-personal-information-highest-bidder\">Are VPN app developers selling your personal information to the highest bidder? \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.theverge.com\/2017\/12\/11\/16761016\/former-facebook-exec-ripping-apart-society\">Former Facebook exec says social media is ripping apart society \u2014 www.theverge.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Propellor Beanie Teritory\n<ul>\n<li><a href=\"https:\/\/www.imore.com\/details-emerge-recently-fixed-homekit-vulnerability\">Details emerge on recently-fixed HomeKit vulnerability \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/12\/ios-jailbreak-exploit-published-by-google\/\">iOS jailbreak exploit published by Google \u2014 nakedsecurity.sophos.com\/\u2026<\/a> &amp; <a href=\"https:\/\/www.imore.com\/google-just-released-tool-helps-security-researchers-hack-iphones\">Google just released a tool that helps security researchers hack iPhones \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/15\/simple-research-tool-detects-19-unknown-data-breaches\/\">Simple research tool detects 19 unknown data breaches \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/19\/microsoft-word-slams-the-door-on-ddeauto-malware-attacks\/\">Microsoft Word slams the door on DDEAUTO malware attacks \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/19\/gps-is-off-so-you-cant-be-tracked-right-wrong\/\">GPS is off so you can\u2019t be tracked, right? Wrong \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Palate Cleansers \u2014 Bumper Christmas Edition<\/h3>\n<ul>\n<li>&#x1f3a7;<a href=\"http:\/\/newyorkpubliclibrary.libsyn.com\/neil-gaiman-reads-a-christmas-carol-rebroadcast-1\">The New York Public Library Podcast : Neil Gaiman Reads &#8220;A Christmas Carol&#8221; (Rebroadcast) \u2014 newyorkpubliclibrary.libsyn.com\/\u2026<\/a><\/li>\n<li>&#x1f39e; <a href=\"https:\/\/www.youtube.com\/watch?app=desktop&amp;v=EDTx3meIeT0\">How Encryption Keys Work &#8211; with Chris Bishop \u2014 www.youtube.com\/\u2026<\/a> (suggested by Allison)<\/li>\n<li>&#x1f39e; <a href=\"http:\/\/www.cgpgrey.com\/blog\/how-do-machines-learn\">How Do Machines Learn? \u2014 www.cgpgrey.com\/\u2026<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Security Medium 1 \u2014 HP&#8217;s Accidental Keylogger Some HP laptops shipped with a keyboard driver from Synaptics in which a developer debugging feature was accidentally left enabled. The effect of this mistake is that the driver has built-in support for logging all keystrokes via WPP (a debugging tool that&#8217;s built into Windows). This sounds bad, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":13191,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147],"tags":[2044,854,50,569],"class_list":["post-13841","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","tag-keylogger","tag-mail","tag-security","tag-security-bits"],"jetpack_featured_media_url":"https:\/\/www.podfeet.com\/blog\/wp-content\/uploads\/2017\/10\/security_bits_logo_300px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/13841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=13841"}],"version-history":[{"count":3,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/13841\/revisions"}],"predecessor-version":[{"id":13844,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/13841\/revisions\/13844"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media\/13191"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=13841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=13841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=13841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}