Security

Mystery Data Breach Dubbed 'db8151dd' Exposes Records of 22 Million People (9to5mac.com) 25

An anonymous reader quotes a report from 9to5Mac: A massive data breach dubbed db8151dd has exposed the records of 22M people -- including addresses, phone numbers, and social media links. But the source of the data is a mystery. I got an email alert this morning from the haveibeenpwned.com site telling me that my details were included. The exposed data appears extensive: "Email addresses, Job titles, Names, Phone numbers, Physical addresses, Social media profiles." However, Troy Hunt, who runs the site, said that nobody has been able to identify where the information came from.

That 'interesting' data appears to come from customer relationship management (CRM) systems, including things like: "Recommended by Andie [redacted last name]. Arranged for carpenter apprentice Devon [redacted last name] to replace bathroom vanity top at [redacted street address], Vancouver, on 02 October 2007." Best guess is it's some kind of aggregated data from a number of sources, but as neither Hunt nor other information security professionals have been able to identify any of them despite attempts lasting almost three months, it appears the details of the privacy breach may remain a mystery.
Hunt says there's almost 90GB of personal information in the open database.

"Back in Feb, Dehashed reached out to me with a massive trove of data that had been left exposed on a major cloud provider via a publicly accessible Elasticsearch instance. It contained 103,150,616 rows in total," writes Hunt. "The global unique identifier beginning with 'db8151dd' features heavily on these first lines hence the name I've given the breach. I've had to give it this name because frankly, I've absolutely no idea where it came from, nor does anyone else I've worked on with this."
Databases

White Supremacists Built a Website To Doxx Interracial Couples (vice.com) 290

White supremacists have reportedly built a website that names, shames, and effectively promotes violence against interracial couples and families -- "and it's been circulated in some of the darkest corners of the internet, including in neo-Nazi Discord servers and accelerationist Telegram channels," reports VICE News. An anonymous reader shares the report: The website was created in April but was taken offline after their initial hosting provider cut ties with them. They then found a home with one of Russia's largest domain registrars, R01. VICE News contacted R01 on Tuesday to ask whether the site violated their policies. An hour later, the site was taken offline, but as of Wednesday morning it was back up. Tatiana Agafonova, a spokesperson for R01, wrote in an email that the company would "diligently render its services to customers" unless a court rules otherwise or they're contacted by law enforcement. The owner of the website shields their identity and location through Cloudflare, a U.S.-based security company that protects customers from DDoS attacks (attempts to crash a website by overwhelming it with data). VICE News contacted Cloudflare to ask how this particular website squared with their policies. They declined to comment on individual websites but directed us to their blog from February 2019, where they "address complaints about content." Their bottom line was that Cloudflare is a security company, and content moderation isn't really their responsibility.

[O]ther online extremists have gotten very good at evading tech crackdowns by employing an ever-evolving shared language of memes and euphemisms used to signpost for the same racist views. The website in question uses the same strategy, which seems to be carefully crafted in an effort to shield the owner from liability. The owner even explicitly states on the site that they do not encourage violence -- all they're doing is listing names and social media accounts as part of a database of "white women who have an interest in black men." One section is titled "toll paid," and it lists women who have been in interracial relationships, and had something horrible happen to them, like death or injury. [...]

The owner of the website claims that the "toll paid" section is intended to catalog incidents where white women are victims of black violence, and isn't an incitement. But "all the disclaimers in the world" may not be enough to protect them from a lawsuit some day, especially if someone is harassed or harmed as a result, says Subodh Chandra, a former federal prosecutor who has handled high-profile civil rights cases, including a recent case against the Daily Stormer.

Security

An Adult Cam Site Exposed 10.88 Billion Records (wired.com) 73

CAM4, a popular adult platform that advertises "free live sex cams," misconfigured an ElasticSearch production database so that it was easy to find and view heaps of personally identifiable information, as well as corporate details like fraud and spam detection logs. According to Wired, the database exposed 7 terabytes of names, sexual orientations, payment logs, and email and chat transcripts -- 10.88 billions records in all. From the report: First of all, very important distinction here: There's no evidence that CAM4 was hacked, or that the database was accessed by malicious actors. That doesn't mean it wasn't, but this is not an Ashley Madison-style meltdown. It's the difference between leaving the bank vault door wide open (bad) and robbers actually stealing the money (much worse). [...] The list of data that CAM4 leaked is alarmingly comprehensive. The production logs Safety Detectives found date back to March 16 of this year; in addition to the categories of information mentioned above, they also included country of origin, sign-up dates, device information, language preferences, user names, hashed passwords, and email correspondence between users and the company.

Out of the 10.88 billion records the researchers found, 11 million contained email addresses, while another 26,392,701 had password hashes for both CAM4 users and website systems. A few hundred of the entries included full names, credit card types, and payment amounts. Who's Affected? It's hard to say exactly, but the Safety Detectives analysis suggests that roughly 6.6 million US users of CAM4 were part of the leak, along with 5.4 million in Brazil, 4.9 million in Italy, and 4.2 million in France. It's unclear to what extent the leak impacted both performers and customers.
The report says CAM4's parent company, Granity Entertainment, took the server offline within a half hour of being contacted by the researchers.
The Courts

Oracle Women Score Major Win in Court Battle Over Equal Pay (bloomberg.com) 81

Three female employees at Oracle scored a major victory in court, gaining the right to represent thousands of others in a gender-discrimination lawsuit over pay, a legal milestone that has eluded women at other tech titans. From a report: A California state judge certified the class action Thursday, allowing the lawsuit to advance on behalf of more than 4,000 women who claim the database giant pays men more for doing the same job. "Whether the jobs at issue in this case are substantially equal or similar is a question of fact for a jury," California Superior Court Judge V. Raymond Swope in Redwood City said in the 25-page ruling, rejecting Oracle's claim that each is an individual case because people in the same job code don't perform substantially similar work. The ruling gives the women critical leverage in pursuing the case under the state's Equal Pay Act.
Databases

British Museum Makes 1.9 Million Images Available For Free (ianvisits.co.uk) 23

The British Museum has revamped its online collections database, making over 1.9 million photos of its collection available for free online under a Creative Commons license. ianVisits reports: Under the new agreement the majority of the 1.9 million images are being made available for anyone to use for free under a Creative Commons 4.0 license. Users no longer need to register to use these photographs, and can now download them directly from the British Museum. Under the terms of the Creative Commons license, you are free to share and adapt the images for non-commercial use, but must include a credit to the British Museum. The relaunch also sees 280,000 new object photographs and 85,000 new object records published for the very first time, many of them acquisitions the Museum has made in recent years, including 73 portraits by Damian Hirst, a previously lost watercolour by Rossetti, and a stunning 3,000-year-old Bronze age pendant. You can view the whole online collection here.
Privacy

Apple and Google Pledge To Shut Down Coronavirus Tracker When Pandemic Ends (theverge.com) 63

An anonymous reader quotes a report from The Verge: On Friday, Apple and Google revised their ambitious automatic contact-tracing proposal, just two weeks after the system was first announced. An Apple representative said the changes were the result of feedback both companies had received about the specifications and how they might be improved. The companies also released a "Frequently Asked Questions" page, which rehashes much of the information already made public. On a call accompanying the announcement, representatives from each company pledged for the first time to disable the service after the outbreak had been sufficiently contained. Such a decision would have to be made on a region-by-region basis, and it's unclear how public health authorities would reach such a determination. However, the engineers stated definitively that the APIs were not intended to be maintained indefinitely.

Under the new encryption specification, daily tracing keys will now be randomly generated rather than mathematically derived from a user's private key. Crucially, the daily tracing key is shared with the central database if a user decides to report their positive diagnosis. As part of the change, the daily key is now referred to as the "temporary tracing key," and the long-term tracing key included in the original specification is no longer present. The new encryption specification also establishes specific protections around the metadata associated with the system's Bluetooth transmissions. Along with the random codes, devices will also broadcast their base power level (used in calculating proximity) and which version of the tool they are running. The companies are also changing the language they use to describe the project. The protocols were initially announced as a contact-tracing system, it is now referred to as an "exposure notification" system. The companies say the name change reflects that the new system should be "in service of broader contact tracing efforts by public health authorities."

Businesses

Drugmaker Tripled the Price of a Pill as it Pursued Coronavirus Use (axios.com) 85

This month, Jaguar Health more than tripled the price of its lone FDA-approved drug, right after asking the federal government to expand the use of its drug to coronavirus patients. AmiMoJo shares a report: Jaguar Health drastically raised the price of a drug during the height of the pandemic, but executives argued the move was needed to stave off the company's collapse. Going into this year, the list price of a 60-pill bottle of Mytesi -- an antidiarrheal medication specifically for people with HIV/AIDS who are on antiretroviral drugs -- was $668.52. On April 9, Jaguar Health raised the price to $2,206.52, according to pricing data from Elsevier's Gold Standard Drug Database. On March 21, Jaguar Health asked the FDA to authorize emergency use of Mytesi for COVID-19 patients who were experiencing any diarrhea or "diarrhea associated with certain antiviral treatments" including remdesivir, among others.
The Internet

NordVPN Unveils First Mainstream WireGuard Virtual Private Network (zdnet.com) 51

One of the largest VPN companies, NordVPN, is rolling out NordLynx -- it's first mainstream WireGuard virtual private network for its Windows, Mac, Android and iOS client-software applications. ZDNet reports: NordVPN's own tests have shown NordLynx easily outperforms the other protocols, IKEv2/IPsec and OpenVPN. How much faster? According to NordVPN's 256,886 speed tests, "When a user connects to a nearby VPN server and downloads content that's served from a content delivery network (CDN) within a few thousand miles/kilometers, they can expect up to twice higher download and upload speed." While speed is what customers will notice, security experts like WireGuard for its code's simplicity. With only about 4,000 lines of code, WireGuard's code can be comprehensively reviewed by a single individual.

Besides WireGuard, NordVPN adds in its double Network Address Translation (NAT) system to protect users' privacy. This enables users to establish a secure VPN connection while storing no identifiable user data on a server. You're assigned a dynamic local IP address that remains assigned only while the session is active. User authentication is done with the help of a secure external database. To switch to NordLynx, users need to update their NordVPN app to the latest version. The NordLynx protocol can be chosen manually from the Settings menu.

Facebook

267 Million Facebook Profiles Being Sold For $600 On Dark Web (bleepingcomputer.com) 17

An anonymous reader shares a report: Threat actors are selling over 267 million Facebook profiles for $623 on dark web sites and hacker forums. While none of these records include passwords, they do contain information that could allow attackers to perform spear phishing or SMS attacks to steal credentials. Last month, security researcher Bob Diachenko discovered an open Elasticsearch database that contained a little over 267 million Facebook records, with most being users from the United States. For many of these records, they contained a user's full name, their phone number, and a unique Facebook ID. The ISP hosting the database eventually took the server offline after being contacted by Diachenko.
AI

Security Lapse Exposed Clearview AI Source Code 22

Zack Whittaker, reporting for TechCrunch: Since it exploded onto the scene in January after a newspaper expose, Clearview AI quickly became one of the most elusive, secretive, and reviled companies in the tech startup scene. The controversial facial recognition startup allows its law enforcement users to take a picture of a person, upload it, and match it against its alleged database of 3 billion images, which the company scraped from public social media profiles. But for a time, a misconfigured server exposed the company's internal files, apps and source code for anyone on the internet to find.

Mossab Hussein, chief security officer at Dubai-based cybersecurity firm SpiderSilk, found the repository storing Clearview's source code. Although the repository was protected with a password, a misconfigured setting allowed anyone to register as a new user to log in to the system storing the code. The repository contained Clearview's source code, which could be used to compile and run the apps from scratch.
AMD

AMD Launches 3 Second-Gen Epyc Processors With 50% Lower Cost of Ownership (venturebeat.com) 36

Advanced Micro Devices said it is adding three new 2nd-Gen AMD Epyc server processors that can deliver up to 50% lower cost of ownership than rival Intel Xeon processors. From a report: The chips are part of AMD's attempt to grab technology leadership away from Intel, which has long dominated the server chip market. AMD has had an advantage lately with its high-performance Zen 2 cores designed to handle database, high-performance computing, and hyper-converged infrastructure workloads, Dan McNamara, senior vice president at AMD's server business unit, said in a press briefing. The three new processors are the AMD Epyc 7F32 (with 8 computing cores), Epyc 7F52 (16 cores) and EPYC 7F72 (24 cores). They have up to 500MHz of additional base frequency and large amounts of cache memory. AMD said the design gives Epyc the world's highest per-core performance x86 server central-processing unit. The previous chips in the second generation of Epyc processors debuted in the third quarter of 2019. [...] The 7F32 is priced at $2,100, the 7F52 at $3,100, and the 7F72 at $2,450.
China

Attack Campaign Hits Thousands of MS-SQL Servers For Two Years (csoonline.com) 33

"In December, security researchers noticed an uptick in brute-force attacks against publicly exposed Microsoft SQL servers," reports CSOnline.

"It turns out the attacks go as far back as May 2018 and infect on average a couple thousand database servers every day with remote access Trojans and cryptominers."

Slashdot reader itwbennett writes: While the primary goal of the attack seems to be cryptocurrency mining, "what makes these database servers appealing for attackers apart from their valuable CPU power is the huge amount of data they hold," say researchers from Guardicore who investigated the attacks. The researchers also note that most machines (60%) stay infected only briefly, but "almost 20% of all breached servers remained infected for more than a week and even longer than two weeks," and 10% become reinfected...

[T]he attackers aggressively remove malware from competitors from targeted machines.

Many of the infected machines are located in America, India, South Korea, and Turkey, according to the article, which adds that the researchers traced the campaign back to China.

"The scans and attacks originate from Chinese IP addresses -- likely associated with infected and hijacked machines -- and the command-and-control servers are also hosted in China and use Chinese language for their web-based management interfaces."
IBM

Not Just 'The Death of IT'. Cringely Also Predicts Layoffs For Many IT Contractors (cringely.com) 78

Last week long-time tech pundit Robert Cringely predicted "the death of IT" in 2020 due to the widespread adoption of SD-WAN and SASE.

Now he's predicting "an even bigger bloodbath as IT employees at all levels are let go forever," including IT consultants and contractors. My IT labor death scenario now extends to process experts (generally consultants) being replaced with automation. In a software-defined network, whether that's SD-WAN or SASE, so much of what used to be getting discreet boxes to talk with one another over the network becomes a simple database adjustment. The objective, in case anyone forgets (as IT, itself, often does) is the improvement of the end-user experience, in this case through an automated process. With SD-WAN, for example, there are over 3,000 available Quality of Service metrics. You can say that Office 365 is a critical metric as just one example. Write a script to that effect into the SD-WAN database, deploy it globally with a keyclick and you are done...

It's slowly dawning on IBM [and its competitors] that they have to get rid of all those process experts and replace them with a few subject matter experts. Here's the big lesson: with SD-WAN and SASE the process no longer matters, so knowing the process (beyond a few silverbacks kept on just in case the world really does end) isn't good for business.

Cringely predicts the downgrading of corporate bonds will also put pressure on IBM and its competitors, perhaps ultimately leading to a sale or spin-off at IBM. "Either they sell the parts that don't make money, which is to say everything except Red Hat and mainframes, or they sell the whole darned thing, which is what I expect to happen."

With that he predicts thousands of layoffs or furloughs — and while the bond market puts IBM in a bigger bind, "this could apply in varying degrees to any IBM competitors."
Security

Marriott Discloses New Data Breach Impacting 5.2 Million Guests (cnet.com) 12

An anonymous reader quotes a report from CNET: Marriott International said Tuesday that names, mailing addresses, loyalty account numbers and other personal information of an estimated 5.2 million guests may've been exposed in a data breach. This is the second major security incident to hit the hotel group in less than two years. Marriott said it spotted that an "unexpected amount" of guest information may've been accessed at the end of February using the login credentials of two employees at a franchise property. The hotel group said information exposed may include names, addresses, emails, phone numbers and birthdays as well as loyalty account details and information like room preferences. Marriott said the investigation is ongoing but that it doesn't believe credit card numbers, passport information or driver's license numbers were exposed. In 2018, Marriott announced that hackers compromised the reservation database for its Starwood division, exposing records of up to 383 million guests and more than 5 million passport numbers.
Databases

The ACM Digital Library Is Now Open Access During Coronavirus Pandemic (acm.org) 32

The Association for Computing Machinery (ACM) has made the ACM Digital Library open access to help support the computing community during the coronavirus pandemic. Founded in 1947, the ACM is the world's largest scientific and educational computing society and publishes over 50 journals, including the prestigious Journal of the ACM, and two general magazines for computer professionals, Communications of the ACM and Queue.

"We believe that ACM can help support research, discovery and learning during this time of crisis by opening the ACM Digital Library to all," writes ACM President Cherri Pancake in a letter on ACM.org. "For the next three months, there will be no fees assessed for accessing or downloading work published by ACM. We hope this will help researchers, practitioners and students maintain access to our publications as well as increasing visibility and awareness of ACM's journals, proceedings and magazines."

The ACM DL will continue to be open through June 30, 2020. "This global health crisis is a unique challenge that has impacted many ACM members," adds Pancake. "We would like to express our concern and support for all who are affected by this outbreak."
The Internet

Dark Web Hosting Site Suffers Cyberattack, 7,600 Sites Down (zdnet.com) 48

It's the largest free web hosting provider for dark web services. But remember back in 2018 when its 6,500 sites all went down after attackers accessed its database and deleted all its accounts?

It happened again -- for the second time in 16 months. And this time, ZDNet reports, Daniel's Host won't be coming back online for several months: Almost 7,600 dark web portals have been taken offline following the hack, during which an attacker deleted the web hosting portal's entire database. This happened earlier this month, on March 10, at around 03:30 am UTC, according to a message posted on DH's now-defunct portal by Daniel Winzen, the German software developer behind the service.

Winzen said that an attacker accessed the DH backend and deleted all hosting-related databases. The attacker then deleted Winzen's database account and created a new one to use for future operations. Winzen discovered the hack the next morning, at which time most of the data was already lost.

The service doesn't keep backups by design.

In an email to ZDNet today, Winzen said he has yet to find out how the hacker breached the DH backend. However, since the dark web hosting service was more of a hobby, Winzen didn't look too much into it. "I am currently very busy with my day-to-day life and other projects, I decided to not spend too much time investigating," he told ZDNet...

Winzen said that users should consider the passwords for their DH accounts as "leaked" and change them if they used the same password for other accounts.

Winzen told ZDNet he still hopes to relaunch the service "at a later time" with "new features and improvements."

"Not having to administrate the services all the time will hopefully give me more time for actual development."
Security

Hacker Selling Data of 538 Million Weibo Users (zdnet.com) 7

The personal details of more than 538 million users of Chinese social network Weibo are currently available for sale online, according to ads seen by ZDNet and corroborating reports from Chinese media. From the report: In ads posted on the dark web and other places, a hacker claims to have breached Weibo in mid-2019 and obtained a dump of the company's user database. The database allegedly contains the details for 538 million Weibo users. Personal details include the likes of real names, site usernames, gender, location, and -- for 172 million users -- phone numbers. Passwords were not included, which explains why the hacker is selling the Weibo data for only $250.
Games

Videogames Are Setting New Records For Simultaneous Users (forbes.com) 19

Forbes reports that in a world filled with school closings and social isolation, gaming has surged: - Steam, the most popular digital PC gaming marketplace, reached new heights Sunday, drawing a record 20,313,451 concurrent users to the 16-year-old service, according to third-party database SteamDB

- Counter-Strike: Global Offensive, released by Steam-owner Valve in 2012, seems to be the top beneficiary of the increased engagement, breaking it's all-time peak on Sunday with 1,023,2290 concurrent players, topping its previous peak last month by a million, which itself beat the record set in April 2016...

- Activision Blizzard's new free-to-play battle royale spinoff Call of Duty: Warzone, launched March 10 on PC, Xbox One and PlayStation 4, is also likely benefiting, drawing in a staggering 15 million in three days, besting the record 10 million in three days by last year's battle royale sensation Apex Legends.

Polygon adds: Gaming saw a 75% increase, week over week, in data usage this March, Verizon said. Video games are proving to be a popular way to pass the time during lockdown -- though we're also starting to see the strain this is placing on various networks and services... Recently, Nintendo experienced a nine-hour network outage. Over the weekend, Xbox Live also went down, preventing users from online play.

Gaming adjacent tools and services are also seeing a surge. As our sibling site The Verge reports, live streaming platform Twitch had a 10% jump in viewership. The popular communication app Discord, meanwhile, recently saw server outages that coincided days after it expanded its screen sharing limit for users.

The games that people are playing themselves are changing in the wake of the coronavirus outbreak, too. Pokemon Go, for instance, has tweaked its mechanics to make it easier for people to play from home, while also changing its events to make it easier for people to play solo. And in an effort to entice its players to stay home, Rockstar vowed to add fun bonuses to the MMO for players who are "spending a little extra time at home." Elsewhere, game developers are starting to give out their games for free in an effort to help people stay indoors. It's no wonder we're seeing changes in usage, playtime, and outages across the board.

Cellphones

A Slashdotter's Take On a Way To Use Smartphones To Defeat the Coronavirus Pandemic 221

Longtime Slashdot reader dbart writes: With the near ubiquitous use of smartphones in America, it's sensible to seize upon this resource to help with the coronavirus pandemic. Here's my take on a way to use smartphones to deal with the pandemic:

America does not currently have a good coronavirus test -- but they are in development. Once a test is available there should be a smartphone app ready to deploy immediately. The app should work like this: A person would be tested for the virus at a testing station and the results of the test would be entered into the app's database. The person could then go about their business, such as going back to work. Upon arriving at the place of work, the person would bring up the app on their smartphone. The app would display some information to identify the subject that was tested along with a barcode. The employer would then scan in the barcode with the app on the employer's phone which will check with the central database and report back the results of their coronavirus test and the recency of the test. The employer would decide whether to allow the person into the workplace. This could similarly be used to safely allow entry to a restaurant, airplane, theater, sporting event, etc. -- thus getting the economy functioning again.

I've only presented a rough sketch of my idea about this above and there's many nuances to how this should work. It's obvious that everyone should be tested frequently for this to be effective. This would require testing on a massive scale, but considering the damage happening to the American economy, such massive testing could easily be justified. A capability as described above would get the American economy restarted at the soonest possible time and would allow society to function until a vaccine is available. It would also be a very valuable asset to epidemiological investigators. If an app was designed with enough forethought it could be deployed internationally. I'm hoping to get not just a Slashdot conversation but a larger conversation started about the use of technology to defeat this virus. Perhaps there's a Slashdotter with the skillsets to make this happen who would like to take this on. If anyone has a contact at the CDC please forward this post to them to insure that technological solutions such as this are being considered.
Businesses

iFixit Is Building a Repair Database For Medical Equipment, and It Needs Your Help (theverge.com) 21

An anonymous reader quotes a report from The Verge: Repair specialist iFixit is building a database filled with repair information for the world's hospital equipment in anticipation of the increased demand caused by COVID-19, the disease caused by the novel coronavirus. In particular, it's calling for repair manuals for ventilators and BiPAP machines that can be used as ventilators. iFixit's database can be found here, and the company is calling for people to create new device pages and upload photographs and manuals.

There are currently few sources for repair manuals online. iFixit notes that resources like Frank's Hospital Workshop exist, but these are relatively small operations. Some manufacturers provide easy access to repair manuals on their websites, but others make them harder to find. There are a few different parts to iFixit's campaign beyond assembling a collection of manuals. Once it's got a manual, the company wants to format its information to make it as easy to understand as possible. It plans to break the manuals down into guides for individual repairs, to reformat them to make them more SEO-friendly, and to translate them into other languages. iFixit also wants to put together preventive maintenance guides so technicians can work to keep their equipment in good working order before it reaches the point of breaking down.
iFixit is also asking people in the medical community "to provide information about which ventilators are currently in use as well as which parts are most likely to break," the report adds. If you have any manuals to contribute, you can upload them to iFixit directly or email the company.

Slashdot Top Deals