Horse Racing Forum - PaceAdvantage.Com - Horse Racing Message Board

Go Back   Horse Racing Forum - PaceAdvantage.Com - Horse Racing Message Board


View Single Post
Old 01-07-2018, 12:44 PM   #20
Jeff P
Registered User
 
Jeff P's Avatar
 
Join Date: Dec 2001
Location: JCapper Platinum: Kind of like Deep Blue... but for horses.
Posts: 5,287
Quote:
Originally Posted by PaceAdvantage View Post
...What is the real difference between this security hole, or a hole in Windows itself (which as we know, has had MANY), that allows a malicious actor to capitalize on said security hole?...

Why is it somehow different or cataclysmic this time around?
It's not an end of the world scenario.

But, to my way of thinking, it's nastier this time around because other than staying completely off the internet - there really isn't an ironclad way to protect yourself.

Or maybe it's been that way for a while and I am just now finding out about it.

Patching your own machine doesn't mean you aren't vulnerable. Using a machine with a non-Intel chip doesn't mean you aren't vulnerable.

Consider the comment that I quoted beneath the article at the following link:
https://seekingalpha.com/article/413...tary-indicates

Quote:
Dannotech

Comments (261) |+ Follow |Send Message

@Jbitzerjr

The way the attacks works is that I could, as a C++ developer, buy a subscription to Azure, write a simple program that does some data analytics in the cloud, load it with my exploit, upload that program to the Azure cloud and let it run. And even though it a purely user-mode application, it has access to the machine and is constantly scraping data from other client OS's on that machine by peeking into the Kernel memory without the datacenter having any knowledge that the attack is happening.

There is no telling who might be my virtual neighbors on that machine, but what if it's a bank's web sight? The attacker could easy scrape account numbers and passwords as users login.

So yea, this is way bigger than on-site bad actors.
Suppose for the sake of argument you are using a machine with an Intel chip that's been patched, or you are using a machine with an AMD chip that isn't vulnerable to the exploit -- and while browsing the web you visit a site hosted on a server that hasn't been patched and has one of the newer Intel chips subject to the exploit.

Also suppose for the sake of argument that I am a hacker, and that I am hosting a site on that same server - a site that you never even visit - and that as part of my site, I am running a web service I wrote for the sole purpose of harvesting keyboard characters keyed by visitors who are browsing all of the other sites hosted on that same server - including the site you went there to visit using your patched machine.

As soon as you log into that site: I am now in possession of your login credentials. Suppose for the sake of argument they are:
Quote:
username: johnsmith @ aol.com
password: jsmith_ #417
Let's further suppose that the site you were visiting is a horse racing message board and it just so happens that's the only site in the world where you are using username johnsmith @ aol.com with password jsmith_ #417.

So the only thing I as a hacker can do with those log in credentials is log into that site and make posts as you.

Like you said: No biggie.

But I'm guessing that if I am able to harvest enough username/passwords:

There are probably a LOT of john smiths out there who are using the same username/password across multiple sites -- including those where real money is handled... paypal, banks, brokerage houses, etc.

The difference here is that patching your own machine, or using a machine with a chipset that isn't vulnerable to the exploits doesn't protect you.

Unless you stay completely off the internet you are literally relying on all web hosts everywhere to maintain servers that have been patched.

Off the top of my head, I'm guessing something like 99.999% of all legitimate web hosts are going to patch their servers as soon as patches become available (and keep them patched.)

But I'm also guessing there are always going to be bad actors who will intentionally operate server farms on machines that are never going to be patched.

I'm also guessing these bad actors will be hosting sites on those machines where the sole objective is to entice as many john smiths as possible to visit, create an account, and log in -- in hopes of harvesting login credentials that can be used somewhere else.

Like I said, maybe it's been that way for a while and I am just now finding out about it.

To my way of thinking, because the only way to really protect yourself is to stay completely off the internet: These exploits seem like a very big deal.




-jp

.
__________________
Team JCapper: 2011 PAIHL Regular Season ROI Leader after 15 weeks
www.JCapper.com

Last edited by Jeff P; 01-07-2018 at 12:52 PM.
Jeff P is offline   Reply With Quote Reply
 
» Advertisement
» Current Polls
Wh deserves to be the favorite? (last 4 figures)
Powered by vBadvanced CMPS v3.2.3

All times are GMT -4. The time now is 03:57 PM.


Powered by vBulletin® Version 3.8.9
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Copyright 1999 - 2023 -- PaceAdvantage.Com -- All Rights Reserved
We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program
designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.