TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Hackers used zerodays to infect Windows, iOS, and Android users

145 点作者 nikbackm大约 4 年前

18 条评论

choeger大约 4 年前
I said this once and I&#x27;ll say it again: To counter such threats we need a healthy heterogeneous ecosystem. According to the article, the attack would have been prevented by using Firefox, (because it relied on a Chrome CVE). It also did not work on Linux and presumably not on Apple&#x27;s ARM CPUs.<p>But unfortunately we don&#x27;t get exponential security. Normally, one would expect that n variables (Browser, OS, CPU architecture) with three choices each should give you 3^n required exploits to cover all combinations.<p>But unfortunately, n is rather small nowadays, the number of choices shrinks every year, and -even more worrying- the attack vectors compose extremely well so you actually just need 3n exploits.<p>So I am a little bit at a loss here how we can make such attacks non-economical again.
评论 #26511691 未加载
评论 #26511834 未加载
评论 #26511631 未加载
评论 #26517265 未加载
评论 #26521163 未加载
评论 #26519647 未加载
评论 #26518137 未加载
评论 #26516965 未加载
评论 #26515976 未加载
swebs大约 4 年前
&gt;The importance of keeping apps and OSes up to date and avoiding suspicious websites still stands. Unfortunately, neither of those things would have helped the victims hacked by this unknown group.<p>Disabling Javascript would have helped. You can even use tools like uMatrix to set exceptions per site so you&#x27;re not exposing yourself to every single site on the internet by default. Though you won&#x27;t see online news sites suggest this since their revenue is so tied to Javascript being enabled.
评论 #26511404 未加载
评论 #26511566 未加载
评论 #26511583 未加载
评论 #26511413 未加载
评论 #26511455 未加载
评论 #26511579 未加载
评论 #26511509 未加载
upofadown大约 4 年前
The actual exploited bugs were mostly found in the OS but this is really about browsers. A contemporary browser pretty much exposes your entire OS to remote attacks. You want to exploit font interpretation? No problem, the browser will happily download your malicious font.<p>There has to be a better way. This isn&#x27;t working...
评论 #26516157 未加载
评论 #26516226 未加载
cyberpunk大约 4 年前
Maybe a better link: <a href="https:&#x2F;&#x2F;googleprojectzero.blogspot.com&#x2F;2021&#x2F;03&#x2F;in-wild-series-october-2020-0-day.html" rel="nofollow">https:&#x2F;&#x2F;googleprojectzero.blogspot.com&#x2F;2021&#x2F;03&#x2F;in-wild-serie...</a>
GartzenDeHaes大约 4 年前
Hackers ARE using zerodays to infect EVERYTHING. I really can&#x27;t understand why people continue to just assume that their endpoints and networks are clean. Worse, they then use the lack of security events to justify not buying the tools and expertise that are necessary to identify compromises.<p>EDIT: not just zerodays. Many organizations have patch schedules that are too slow.
评论 #26517733 未加载
jokoon大约 4 年前
I really don&#x27;t understand why people decide to work in computer security, today it&#x27;s really an arms race. I see how it&#x27;s like games of lockpicking, but honestly I don&#x27;t understand the value of it.<p>It&#x27;s like being in the arms trade: what matters is who you decide to trade with.<p>Honestly, I&#x27;d rather see myself as anti-cyber-war at this point, like anti-war protests, meaning telling people to use computers for less critical tasks, and disengaging from certain areas.
评论 #26515527 未加载
评论 #26515432 未加载
评论 #26517461 未加载
strogonoff大约 4 年前
It seems that a watering hole attack by definition targets users of a particular organization, but articles on this event make no mention of which organizations would that be, sounding like it affects general public. Wondering who should be worried.<p>Related: can community recommend some forums, periodic publications or other sources that aggregate information security news?
评论 #26511372 未加载
评论 #26518127 未加载
pacificmint大约 4 年前
If a PC is infected I can (and should) reinstall everything from scratch. That should remove the malware, barring some super resistant malware that hides in the BIOS or something like that.<p>What do you do on an iOS device? Does a full device reset reinstall the OS, or does it simply remove all user settings?<p>I feel like the locked down nature of iOS makes it harder to attack, but if an attack goes thru it would also make it harder to clean up the attack?
评论 #26511666 未加载
评论 #26511401 未加载
评论 #26511510 未加载
评论 #26511602 未加载
sneak大约 4 年前
How long until we realize that JIT was a mistake and that we should offer orders of magnitude slower JS in browsers that is actually safe (or start building webpages without JS at all again, which will probably never happen) lest we give every website the ability to take over our device?<p>I&#x27;d pay real money for a browser with a slow, safe JS interpreter.
评论 #26511519 未加载
评论 #26511452 未加载
评论 #26511447 未加载
boringg大约 4 年前
Curious why there isn&#x27;t more specificity in the article? Is it to protect the sites and allow them time to fix? I&#x27;m not asking in a derogatory fashion, more trying to figure out the level of potential exposure I have myself. Tough to determine from the article.
dave_sullivan大约 4 年前
Been playing with tools like angr lately and learning more about binary analysis.<p>It seems to me that &quot;automatic exploit generation&quot; is improving quite a bit where the infrastructure for analysis is a little tricky to set up, but then you can direct that infrastructure to analyze the code for you. The bad guys and good guys are in a race to find new exploits faster (they always have been) but I&#x27;ve been pretty amazed by the direction I see things going with automation.<p>I might just go back to pen and paper at this point.
评论 #26511571 未加载
评论 #26521964 未加载
rany_大约 4 年前
Why is &quot;expert&quot; in quotes? Aren&#x27;t 11 zerodays impressive?
评论 #26511285 未加载
评论 #26511305 未加载
评论 #26511292 未加载
评论 #26511288 未加载
donatj大约 4 年前
The scare quotes in the title read as sarcasm but they clearly didn’t intend them as such. An odd choice as I almost overlooked the article assuming it was a tale of some failed hackers.
评论 #26511381 未加载
评论 #26511423 未加载
评论 #26511394 未加载
brundolf大约 4 年前
It hints but doesn&#x27;t outright say that these attacks were highly targeted to specific people, and not the general public; is that known?
headmelted大约 4 年前
Probably a stupid question to ask, and I realise the bigger picture here is that there are sophisticated groups searching for complicated exploits all the time, but are <i>these</i> specific exploits addressed already in the latest software updates for the affected platforms?<p>Wasn’t clear to me from the article, although I may just have missed it being the idiot that I am.
评论 #26512061 未加载
ddtaylor大约 4 年前
What sites were targeted?
trepatudo大约 4 年前
Even if it this worked on Linux, would a chrome running in flatpak sandbox be able to escalate privileges?
sloshnmosh大约 4 年前
My guess is that the watering hole websites were probably browsed by minorities frowned upon by the Chinese state.<p>The Volexity blog covers some of the earlier watering hole attacks in more detail.