outage – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 11 Jul 2022 05:07:24 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png outage – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 The Night of a Thousand Errors | LINUX Unplugged 466 https://original.jupiterbroadcasting.net/149197/the-night-of-a-thousand-errors-linux-unplugged-466/ Sun, 10 Jul 2022 19:15:00 +0000 https://original.jupiterbroadcasting.net/?p=149197 Show Notes: linuxunplugged.com/466

The post The Night of a Thousand Errors | LINUX Unplugged 466 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxunplugged.com/466

The post The Night of a Thousand Errors | LINUX Unplugged 466 first appeared on Jupiter Broadcasting.

]]>
Linux Action News 165 https://original.jupiterbroadcasting.net/143502/linux-action-news-165/ Sun, 29 Nov 2020 14:45:00 +0000 https://original.jupiterbroadcasting.net/?p=143502 Show Notes: linuxactionnews.com/165

The post Linux Action News 165 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxactionnews.com/165

The post Linux Action News 165 first appeared on Jupiter Broadcasting.

]]>
Dependency Dangers | Coder Radio 348 https://original.jupiterbroadcasting.net/129766/dependency-dangers-coder-radio-348/ Tue, 12 Mar 2019 07:24:49 +0000 https://original.jupiterbroadcasting.net/?p=129766 Show Notes: coder.show/348

The post Dependency Dangers | Coder Radio 348 first appeared on Jupiter Broadcasting.

]]>

Show Notes: coder.show/348

The post Dependency Dangers | Coder Radio 348 first appeared on Jupiter Broadcasting.

]]>
Kill Switch Engage | TechSNAP 320 https://original.jupiterbroadcasting.net/115001/kill-switch-engage-techsnap-320/ Tue, 23 May 2017 18:16:19 +0000 https://original.jupiterbroadcasting.net/?p=115001 RSS Feeds: HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Cisco’s Talos Intelligence Group Blog: Player 3 Has Entered the Game: Say Hello to ‘WannaCry’ FCC Filings Overwhelmingly Support Net Neutrality Once Anti-Net Neutrality Spam is Removed Net Neutrality II: Last Week Tonight […]

The post Kill Switch Engage | TechSNAP 320 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Cisco’s Talos Intelligence Group Blog: Player 3 Has Entered the Game: Say Hello to ‘WannaCry’

FCC Filings Overwhelmingly Support Net Neutrality Once Anti-Net Neutrality Spam is Removed


Feedback


Round Up:


The post Kill Switch Engage | TechSNAP 320 first appeared on Jupiter Broadcasting.

]]>
Metadata Matters | TechSNAP 306 https://original.jupiterbroadcasting.net/106886/metadata-matters-techsnap-306/ Wed, 15 Feb 2017 00:09:34 +0000 https://original.jupiterbroadcasting.net/?p=106886 RSS Feeds: HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: House Passes Long-Sought Email Privacy Bill The U.S. House of Representatives on Monday approved a bill that would update the nation’s email surveillance laws so […]

The post Metadata Matters | TechSNAP 306 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

House Passes Long-Sought Email Privacy Bill

Here’s What Transport for London Learned From Tracking Your Phone On the Tube

  • Advertising? I can see how this is useful for more than just advertising. Traffic flow. Knowing about time from A to B. Mention EZPass and monitoring of badges to determine flow.

  • Signs announced trial, opt out by disabling wifi.

  • The documents also seem to suggest that if TfL switched on tracking full time it could offer real time crowding information to passengers – so we could see a CityMapper of the not-too-distant future telling us which stations to avoid.

  • That sounds simlar to how Waze and Google Maps collect real-time data on traffic congestion.

  • Collecting information is one thing. Controlling access to that information is vital. As we’ve seen so many times in the past, it is the use of that data for unintended purposes which is of most concern.

  • Rainbow tables

GitLab Postmortem of database outage of January 31

  • This came from Shawn. We covered this incident in eposide 305.

  • I want to make it clear from the start, we are not mocking GitLab. There is no joy to be taken here.

  • On January 31st 2017, we experienced a major service outage for one of our products, the online service GitLab.com. The outage was caused by an accidental removal of data from our primary database server.

  • What a horrible feeling that engineer then had. Imagine, for a moment. Production has just been wiped out… OMG.

  • Backups could not be found, nor could they be used. It was all gone.

  • I can imagine lots and lots of waiting for stuff to finish. Very stressful. Much hope, but very stressful.

  • Wow, could not access their own projects. Ouch. Almost want their own repo offline, but then accusations of not dog fooding, etc.

  • Prometheus monitorin

  • Some places take the approach of making staging the hot backup for production. Exactly the same. Move production onto staging hardware if required.

  • “I don’t remember where I saw it (probably hackernews), but someone proposed to constantly recreate staging from production’s backup. This way we would have an up-to-date staging version and frequently tested backup recovery process.”


Feedback:


Round Up:


The post Metadata Matters | TechSNAP 306 first appeared on Jupiter Broadcasting.

]]>
Curl Sleeper Agent | TechSNAP 266 https://original.jupiterbroadcasting.net/99721/curl-sleeper-agent-techsnap-266/ Thu, 12 May 2016 19:37:51 +0000 https://original.jupiterbroadcasting.net/?p=99721 Zero-day exploits striking over 100 systems, if you think copying links to bash scripts from the internet is okay, maybe you shouldn’t be root & the day Google automated itself off the internet. Plus your questions, our answers, a huge round up & more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD […]

The post Curl Sleeper Agent | TechSNAP 266 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Zero-day exploits striking over 100 systems, if you think copying links to bash scripts from the internet is okay, maybe you shouldn’t be root & the day Google automated itself off the internet.

Plus your questions, our answers, a huge round up & more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Zero-day exploits against Microsoft used against PoS systems of over 100 companies

  • “More than 100 North American companies were attacked by crooks exploiting a Windows zero day vulnerability. The attacks began in early March and involved the zero day vulnerability CVE-2016-0167 reported and partially fixed in April’s Patch Tuesday security bulletins by Microsoft. The zero day was found by researchers at FireEye, who on Tuesday disclosed details.”
  • “The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka “Win32k Elevation of Privilege Vulnerability””
  • “FireEye said the flaw is a local elevation of privilege flaw in the win32k Windows Graphics subsystem. Attackers are able to exploit the flaw once they are able to remotely execute code on the targeted PC. Microsoft patched the vulnerability on April 12 and released a subsequent update (MS16-062) this week”
  • “In March 2016, a financially motivated threat actor launched several tailored spear phishing campaigns primarily targeting the retail, restaurant, and hospitality industries. The emails contained variations of Microsoft Word documents with embedded macros that, when enabled, downloaded and executed a malicious downloader that we refer to as PUNCHBUGGY.”
  • “PUNCHBUGGY is a dynamic-link library (DLL) downloader, existing in both 32-bit and 64-bit versions, that can obtain additional code over HTTPS. This downloader was used by the threat actor to interact with compromised systems and move laterally across victim environments.”
  • “In some victim environments, the threat actor exploited a previously unknown elevation of privilege (EoP) vulnerability in Microsoft Windows to selectively gain SYSTEM privileges on a limited number of compromised machines”
  • “This actor has conducted operations on a large scale and at a rapid pace, displaying a level of operational awareness and ability to adapt their operations on the fly. These abilities, combined with targeted usage of an EoP exploit and the reconnaissance required to individually tailor phishing emails to victims, potentially speaks to the threat actors’ operational maturity and sophistication”
  • “Security experts say, as more U.S. companies snuff out point of sale malware by deploying chip-and-PIN bank card technology, attackers are rushing to exploit existing magnetic strip card systems still vulnerable to malware. FireEye, for example, reported last month that that a group of hackers that go by the name Bears Inc. are behind the latest barrage of attacks with a custom-built point of sale malware called Treasurehunt. This latest zero day vulnerability follows the same trend.”
  • I would argue that chip&pin does not make the PoS terminal any less vulnerable to malware
  • While it does make it harder to clone cards, it think it should not be viewed as a solution to malware
  • FireEye Report

If you think doing curl|bash is ok, you shouldn’t have root

  • “Installing software by piping from curl to bash is obviously a bad idea and a knowledgeable user will most likely check the content first. So wouldn’t it be great if a malicious payload would only render when piped to bash?”
  • So, we all know it is bad, some some people do it anyway. They tell themselves it is alright because they check the contents of the script before they run it
  • That only works if what you end up downloading is the same as what you actually reviewed
  • “Luckily the behaviour of curl (and wget) changes subtly when piped into bash. This allows an attacker to present two different versions of their script depending on the context :)”
  • “It’s not that the HTTP requests from curl when piped to bash look any different than those piped to stdout, in fact for all intents and purposes they are identical”
  • “Execution in bash is performed line by line and so the speed that bash can ingest data is limited by the speed of execution of the script. This means if we return a sleep at the start of our script the TCP send stream will pause while we wait for the sleep to execute. This pause can be detected and used to render different content streams.”
  • “Unfortunately it’s not just a simple case of wrapping a socket.send(“sleep 10”) in a timer and waiting for a send call to block. The send and receive TCP streams in linux are buffered on a per socket basis, so we have to fill up these buffers before the call to send data will block. We know the buffer is full when the receiving client to replies to a packet with the Window Size flag set to 0”
  • “The only character you can really use to fill the buffer is a null byte as it won’t render in most consoles. It also won’t render in chrome when the charset text/html is specified. As we don’t know the content-length data is transferred with chunked encoding with each chunk being a string of null bytes same size as the TCP send buffer.”
  • So, the attacker sends chunks of null bytes until all of the buffers on the client side are full, because bash is sleeping and not reading any more data yet
  • So the attacker just has to see if you are piping the content to bash, or to your terminal or browser. Only in the case of bash do they send the “payload”
  • There is a nice demo included in the article

Post Mortem: When google automated itself off the internet

  • “On Monday, 11 April, 2016, Google Compute Engine instances in all regions lost external connectivity for a total of 18 minutes, from 19:09 to 19:27 Pacific Time.”
  • This is the story of how automation knocked all of GCE off of the internet
  • “Google uses contiguous groups of internet addresses — known as IP blocks — for Google Compute Engine VMs, network load balancers, Cloud VPNs, and other services which need to communicate with users and systems outside of Google. These IP blocks are announced to the rest of the internet via the industry-standard BGP protocol, and it is these announcements which allow systems outside of Google’s network to ‘find’ GCP services regardless of which network they are on.”
  • “To maximize service performance, Google’s networking systems announce the same IP blocks from several different locations in our network, so that users can take the shortest available path through the internet to reach their Google service. This approach also enhances reliability; if a user is unable to reach one location announcing an IP block due to an internet failure between the user and Google, this approach will send the user to the next-closest point of announcement. This is part of the internet’s fabled ability to ‘route around’ problems, and it masks or avoids numerous localized outages every week as individual systems in the internet have temporary problems.”
  • Also know as “anycast”
  • “At 14:50 Pacific Time on April 11th, our engineers removed an unused GCE IP block from our network configuration, and instructed Google’s automated systems to propagate the new configuration across our network. By itself, this sort of change was harmless and had been performed previously without incident. However, on this occasion our network configuration management software detected an inconsistency in the newly supplied configuration. The inconsistency was triggered by a timing quirk in the IP block removal – the IP block had been removed from one configuration file, but this change had not yet propagated to a second configuration file also used in network configuration management. In attempting to resolve this inconsistency the network management software is designed to ‘fail safe’ and revert to its current configuration rather than proceeding with the new configuration. However, in this instance a previously-unseen software bug was triggered, and instead of retaining the previous known good configuration, the management software instead removed all GCE IP blocks from the new configuration and began to push this new, incomplete configuration to the network.”
  • “One of our core principles at Google is ‘defense in depth’, and Google’s networking systems have a number of safeguards to prevent them from propagating incorrect or invalid configurations in the event of an upstream failure or bug. These safeguards include a canary step where the configuration is deployed at a single site and that site is verified to still be working correctly, and a progressive rollout which makes changes to only a fraction of sites at a time, so that a novel failure can be caught at an early stage before it becomes widespread. In this event, the canary step correctly identified that the new configuration was unsafe. Crucially however, a second software bug in the management software did not propagate the canary step’s conclusion back to the push process, and thus the push system concluded that the new configuration was valid and began its progressive rollout.”
  • So, the automation software detected that the new configuration was bad, but, ignored this signal and went ahead anyway
  • “As the rollout progressed, those sites which had been announcing GCE IP blocks ceased to do so when they received the new configuration. The fault tolerance built into our network design worked correctly and sent GCE traffic to the the remaining sites which were still announcing GCE IP blocks.”
  • “With no sites left announcing GCE IP blocks, inbound traffic from the internet to GCE dropped quickly, reaching >95% loss by 19:09. Internal monitors generated dozens of alerts in the seconds after the traffic loss became visible at 19:08, and the Google engineers who had been investigating a localized failure of the asia-east1 VPN now knew that they had a widespread and serious problem. They did precisely what we train for, and decided to revert the most recent configuration changes made to the network even before knowing for sure what the problem was. This was the correct action, and the time from detection to decision to revert to the end of the outage was thus just 18 minutes.”
  • “With the immediate outage over, the team froze all configuration changes to the network, and worked in shifts overnight to ensure first that the systems were stable and that there was no remaining customer impact, and then to determine the root cause of the problem. By 07:00 on April 12 the team was confident that they had established the root cause as a software bug in the network configuration management software.”
  • Moving forward, Google will add:
  • Monitoring targeted GCE network paths to detect if they change or cease to function
  • Comparing the IP block announcements before and after a network configuration change to ensure that they are identical in size and coverage
  • Semantic checks for network configurations to ensure they contain specific Cloud IP blocks.
  • “We take all outages seriously, but we are particularly concerned with outages which affect multiple zones simultaneously because it is difficult for our customers to mitigate the effect of such outages. This incident report is both longer and more detailed than usual precisely because we consider the April 11th event so important, and we want you to understand why it happened and what we are doing about it. It is our hope that, by being transparent and providing considerable detail, we both help you to build more reliable services, and we demonstrate our ongoing commitment to offering you a reliable Google Cloud platform.”

Drama at the Internet’s malware dumping ground

  • VirusTotal is a popular online malware aggregation service started in 2004, and acquired by Google in 2012.
  • It allows researchers and users to submit malware samples which are tested against the static detection engines of some 50+ anti-virus vendors
  • An example analysis
  • However, there is concern that many “NextGen” Security startups, are just abusing the VirusTotal API rather than building their own detection engine
  • Worse, this type of use doesn’t contribute anything back to the community
  • So Google has changed the Terms of Services: “All scanning companies will now be required to integrate their detection scanner in the public VT interface, in order to be eligible to receive antivirus results as part of their VirusTotal API services”
  • “Additionally, new scanners joining the community will need to prove a certification and/or independent reviews from security testers according to best practices of Anti-Malware Testing Standards Organization (AMTSO)”
  • Traditional vendors have applauded the move:
  • Trend Micro
  • MalwareBytes
  • Of course, there is also a response from the other side
  • The AV Bomb That Never Was
  • Includes responses from Cylance, and SentinelOne, two of the larger “NextGen” security companies
  • Also has summaries from Palo Alto Networks and CrowdStrike
  • How this actually impacts the industry is yet to be seen, but I don’t expect much outside of a few shady startups going away, but they were going to do that anyway
  • Additional Coverage

Feedback:


Round Up:


The post Curl Sleeper Agent | TechSNAP 266 first appeared on Jupiter Broadcasting.

]]>
Belkin Heartbeat Stops | TechSNAP 183 https://original.jupiterbroadcasting.net/68917/belkin-heartbeat-stops-techsnap-183/ Thu, 09 Oct 2014 18:05:41 +0000 https://original.jupiterbroadcasting.net/?p=68917 The Belkin router apocalypse takes users offline all over the world, Infected ATMs spit out money on cue, plus isolating your network, a great batch of your questions & much, much more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube […]

The post Belkin Heartbeat Stops | TechSNAP 183 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The Belkin router apocalypse takes users offline all over the world, Infected ATMs spit out money on cue, plus isolating your network, a great batch of your questions & much, much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Belkin router apocolypse, world wide outage of almost all Belkin routers

  • “Starting approximately midnight on October 7, Belkin began experiencing an issue with a service configured in certain Belkin router models that causes a failure when it checks for general network connectivity by pinging a site hosted by Belkin.”
  • It seems Belkin routers check to see if “the internet is up” by pinging or connecting to heartbeat.belkin.com. When this service went down, all of those routers decided the internet was ‘down’, and stopped letting customers use the Internet, despite the fact that the rest of the Internet was fine
  • “One of our cloud services associated with maintaining router operations was negatively impacted by a change made in our data center that caused a false denial of service. Normal operations were restored by 3PM PST, but some users might still need to reset their router and/or cable modem to regain connectivity. Moving forward, we will continue to monitor, improve and validate the system to ensure our routers continue to work properly in the event connectivity to our cloud environment is not available. “
  • The fact that the routers rely on only a single signal, a response from heartbeat.belkin.com, to determine if the internet is working, seems wrong.
  • Even so, it doesn’t explain why the routers ‘give up’ and stops users accessing the Internet
  • It appears this has to do with the DNS Resolver in the Router, which stops attempting to resolve addresses when it cannot reach the Belkin site. Users to manually change their DNS servers to Google Public DNS or OpenDNS had their service restored
  • What if the Belkin site goes down? (Like it did). What if there is a routing or transit issue? What if access to the Belkin site is blocked in your country?
  • “If your service has not yet been restored, please unplug your router and plug it back in after waiting 1 minute. Wait 5 more minutes and the router should reconnect.”
  • There were rumours that this issue was caused by a firmware update. Belkin denies this, although it is not clear if they had pushed a firmware update around the same time or not
  • Interesting: Apparently Belkin’s call center got a high volume of calls. How many users call their Router manufacturer when they have an issue, rather than their ISP? My Cisco router/modem only had my ISPs phone number on it.
  • Belkin Status Page
  • Belkin Community Forums
  • Additional Coverage: Internet Storm Center

Infected ATMs spit out money on queue, without debiting anyones bank account

  • “What do you need in order to withdraw cash from an ATM?”
  • First, you need to have a debit or credit card, which acts as a key to your bank account
  • Second, you must know the PIN code associated with the card; otherwise, the bank wouldn’t approve the transaction.
  • Finally, you need to have some money in your account that you can withdraw.
  • Or, you just need a bootable CD
  • “However, hackers do things differently: they don’t need cards, PIN codes or bank accounts to get money. In reality, all they need is an ATM with some cash in it and a special piece of software.”
  • “criminals were somehow able to physically access the ATMs so that they could install the malware via a bootable CD on an embedded Windows machine”
  • “The trojan that was used had complex abilities. First, when activated inside of the ATM, it had the ability to turn off the McAfee Solidcare AV software so that it could do its job with ease”
  • “Second, to avoid accidental detection, Tyupkin trojan had the ability to stay in a standby mode for an entire week and activate only Sunday and Monday nights.”
  • “Third, it had the ability to disable the local network in the case of an emergency, so that the bank could not remotely connect to the ATM to check on what was happening with it.”
  • “All an attacker has to do is merely approach an infected ATM and enter a special PIN code in order to access the secret menu that will allow him to make cash withdrawals or control the trojan (for example, to delete it).”
  • “To make a withdrawal the person has to know the appropriate commands, as well as a special formula that will calculate a session key — some kind of a two-factor authentication. If both codes are correct, then a second menu will appear that allows the criminal to choose the cassette number and make a withdrawal.”
  • “Although one can only dispense 40 banknotes per transaction, it’s possible to dispense any amount of money by simply performing the actions several times over.”

Pair arrested for exploiting flaw in Casino slot machines

  • John Kane, a gambling addict, and an accomplice, Andre Nestor, exploited a bug in Game King video poker slot machines
  • “It turned out the Game King’s endless versatility was also its fatal flaw. In addition to different game variants, the machine lets you choose the base level of your wagers: At the low-limit Fremont machines, you could select six different denomination levels, from 1 cent to 50 cents a credit”
  • “The key to the glitch was that under just the right circumstances, you could switch denomination levels retroactively. That meant you could play at 1 cent per credit for hours, losing pocket change, until you finally got a good hand—like four aces or a royal flush. Then you could change to 50 cents a credit and fool the machine into re-awarding your payout at the new, higher denomination. “
  • “Performing that trick consistently wasn’t easy—it involved a complicated misdirection that left the Game King’s internal variables in a state of confusion. But after seven hours rooted to their seats, Kane and Nestor boiled it down to a step-by-step recipe that would work every time. “
  • It turns out John Kane was very familiar with the slot machine in question:
  • “he blew half a million dollars in 2006 alone—a pace that earned him enough Player’s Club points to pay for his own Game King to play at his home on the outskirts of Vegas, along with technicians to service it. (The machine was just for fun—it didn’t pay jackpots.)“ He’s played more than anyone else in the United States, says his lawyer, Andrew Leavitt. I’m not exaggerating or embellishing. It’s an addiction.”
  • Game King 5.0 was released in 2002, however it contained a series of subtle errors in program number G0001640 that evaded laboratory testing and source code review.
  • “The bug survived like a cockroach for the next seven years. It passed into new revisions, one after another, ultimately infecting 99 different programs installed in thousands of IGT machines around the world. As far as anyone knows, it went completely undetected until late April 2009, when John Kane was playing at a row of four low-limit Game Kings outside the entrance to a Chinese fast food joint”
  • “Kane had some idea of how the glitch operated but hadn’t been able to reliably reproduce it. Working together, the two men began trying different combinations of play, game types, and bet levels, sounding out the bug like bats in the dark.”
  • The pair eventually sorted out the details, and managed to get more than $750,000 out of various slot machines before being arrested

Feedback:


Round up:


The post Belkin Heartbeat Stops | TechSNAP 183 first appeared on Jupiter Broadcasting.

]]>
Comcast Carries Grudge | Tech Talk Today 72 https://original.jupiterbroadcasting.net/68707/comcast-carries-grudge-tech-talk-today-72/ Wed, 08 Oct 2014 10:39:39 +0000 https://original.jupiterbroadcasting.net/?p=68707 Belkin users go offline all over the world due to a router design flaw, Facebook has a private chat app in the works, Adobe spies on you & Comcast gets a customer fired for complaining about their service. Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS […]

The post Comcast Carries Grudge | Tech Talk Today 72 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Belkin users go offline all over the world due to a router design flaw, Facebook has a private chat app in the works, Adobe spies on you & Comcast gets a customer fired for complaining about their service.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

Borked Belkin routers leave many unable to get online | Ars Technica

Owners of Belkin routers around the world are finding themselves unable to get online today. Outages appear to be affecting many different models of Belkin router, and they’re hitting customers on any ISP, with Time Warner Cable and Comcast among those affected. ISPs, inundated with support calls by unhappy users, are directing complaints to Belkin’s support line, which appears to have gone into meltdown in response.


The reason for the massive outages is currently unknown. Initial speculation was that Belkin pushed a buggy firmware update overnight, but on a reddit thread about the problem, even users who claim to have disabled automatic updates have found their Internet connectivity disrupted.

Update: Belkin has given us the following statement:

Starting approximately midnight on October 7, Belkin began experiencing an issue with a service configured in certain Belkin router models that causes a failure when it checks for general network connectivity by pinging a site hosted by Belkin.


If your service has not yet been restored, please unplug your router and plug it back in after waiting 1 minute. Wait 5 more minutes and the router should reconnect. If you have any further issues, please contact our support at (800) 223-5546.

Facebook Readies App Allowing Anonymity – NYTimes.com

The company is working on a stand-alone mobile application that allows users to interact inside of it without having to use their real names, according to two people briefed on Facebook’s plans, who spoke on the condition of anonymity because they were not authorized to discuss the project.


The point, according to these people, is to allow Facebook users to use multiple pseudonyms to openly discuss the different things they talk about on the Internet; topics of discussion which they may not be comfortable connecting to their real names.


There are many unknowns as to how the new app will interact, if at all, with Facebook’s main site. It is unclear if the app will allow anonymous photo sharing, or how friend interactions and existing friend connections will work.

Adobe spies on reading habits over unencrypted web because your ‘privacy is important’ • The Register

Adobe confirmed its Digital Editions software insecurely phones home your ebook reading history to Adobe — to thwart piracy.

And the company insisted the secret snooping is covered in its terms and conditions.

Version 4 of the application makes a note of every page read, and when, in the digital tomes it accesses, and then sends that data over the internet unencrypted to Adobe.

Adobe explained that the data it collects is for digital rights management (DRM) mechanisms that may be demanded by publishers to combat piracy, and gave a detailed list of what and why it needs such specific information:

  • User ID: The user ID is collected to authenticate the user.
  • Device ID: The device ID is collected for digital right management (DRM) purposes since publishers typically restrict the number of devices an eBook or digital publication can be read on.
  • Certified app ID: The Certified App ID is collected as part of the DRM workflow to ensure that only certified apps can render a book, reducing DRM hacks and compromised DRM implementations.
  • Device IP: The device IP is collected to determine the broad geo-location, since publishers have different pricing models in place depending on the location of the reader purchasing a given eBook or digital publication.
  • Duration for which the book was read: This information is collected to facilitate limited or metered pricing models where publishers or distributors charge readers based on the duration a book is read. For example, a reader may borrow a book for a period of 30 days. While some publishers/distributers charge for 30-days from the date of the download, others follow a metered pricing model and charge for the actual time the book is read.
  • Percentage of the book read: This information is collected to allow publishers to implement subscription models where they can charge based on the percentage of the book read. For example, some publishers charge only a percentage of the full price if only a certain percentage of the book is read.

Additionally, the following data is provided by the publisher as part of the actual license and DRM for the ebook:

  • Date of purchase or download
  • Distributor ID and Adobe content server operator URL
  • Metadata of the book provided by publisher (including title, author, publisher list price, ISBN number)

Complain About Comcast, Get Fired From Your Job – Slashdot

When you complain to your cable company, you certainly don’t expect that the cable company will then contact your employer and discuss your complaint. But that’s exactly what happened to one former Comcast customer who says he was fired after the cable company called a partner at his accounting firm. Be careful next time when you exercise your first amendment rights.

  • From the article:

At some point shortly after that call, someone from Comcast contacted a partner at the firm to discuss Conal. This led to an ethics investigation and Conal’s subsequent dismissal from his job; a job where he says he’d only received positive feedback and reviews for his work.

Comcast maintained that Conal used the name of his employer in an attempt to get leverage. Conal insists that he never mentioned his employer by name, but believes that someone in the Comcast Controller’s office looked him up online and figured out where he worked.
When he was fired, Conal’s employer explained that the reason for the dismissal was an e-mail from Comcast that summarized conversations between Conal and Comcast employees.

But Conal has never seen this e-mail in order to say whether it’s accurate and Comcast has thus far refused to release any tapes of the phone calls related to this matter._

The post Comcast Carries Grudge | Tech Talk Today 72 first appeared on Jupiter Broadcasting.

]]>
Google’s Automated Outage | TechSNAP 147 https://original.jupiterbroadcasting.net/50702/googles-automated-outage-techsnap-147/ Thu, 30 Jan 2014 17:44:34 +0000 https://original.jupiterbroadcasting.net/?p=50702 Microsoft has been breached, Google suffers a major outage, and finally some solid technical details on Target’s massive credit card hack.

The post Google's Automated Outage | TechSNAP 147 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Microsoft has been breached, Google suffers a major outage, and finally some solid technical details on Target’s massive credit card hack.

Plus a great batch of your questions, a rockin roundup, and much much more.

Thanks to:


GoDaddy


Ting

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Microsoft breach leads to hackers stealing Law Enforcement documents

  • According to the company, a number of Microsoft employees were targeted with attacks aiming to compromise both email and social media accounts, and in some cases, the attacks were successful.
  • “It appears that documents associated with law enforcement inquiries were stolen”
  • Adrienne Hall, General Manager at Microsoft’s Trustworthy Computing Group, wrote in a blog post.
  • He continues: “If we find that customer information related to those requests has been compromised, we will take appropriate action,” Hall continued. “Out of regard for the privacy of our employees and customers – as well as the sensitivity of law enforcement inquiries – we will not comment on the validity of any stolen emails or documents.”
  • The attackers have conducted their offensive against both email and social media accounts of Microsoft’s employees, the company did not reveal how many documents might have been exposed neither the nature of the attackers.
  • What’s interesting about this is that the incident was significant enough to disclose, indicating that a fair number of documents could have been exposed, or that the company fears some documents will make their way to the public if released by the attackers.
  • According to Microsoft, the Syrian Electronic Army may be behind the attacks.
  • “Our current information suggests the phishing attacks are related,” Hall told SecurityWeek in an emailed statement.
  • In March 2013, Microsoft released its first transparency report, noting that it had received over 70,000 law enforcement requests in 2012.
  • Additional Coverage:
  • Spear phishing against Microsoft, exposed law enforcement inquiries
  • Microsoft Believes Law Enforcement Documents Compromised in Hack
  • Microsoft says new phishing attacks targeted law enforcement documents | Ars Technica
  • Microsoft: documents were stolen during recent employee email hack | The Verge
  • Syrian Electronic Army stole law enforcement docs from Microsoft

Target Update

  • An examination of the malware used in the Target breach suggests that the attackers may have had help from a poorly secured feature built into a widely-used IT management software
  • As we previously noted the attackers used malware on the POS boxes to send credit card data read from memory to a central control server on Targets internal network.
  • The user account “Best1_user” and password “BackupU$r” were used to log in to the shared drive (indicated by the “S:” under the “Resource Type” heading in the image above.
  • That username is the same one that gets installed with an IT management software suite called Performance Assurance for Microsoft Servers. This product, according to its maker — Houston, Texas base BMC Software — includes administrator-level user account called “Best1_user.”
  • BMC explains the Best1_user account is installed by the software to do routine tasks. That article states that while the Best1_user account is essentially a “system” or “administrator” level account on the host machine
  • The Best1_user account appears to be associated with the Performance Assurance component of BMC Software’s Patrol product. According to BMC’s documentation, this account is normally restricted, but the attackers may have usurped control to facilitate lateral movement within the network.” According to a Dell SecureWorks paper being circulated to certain Dell customers.
  • According to SecureWorks, one component of the malware installed itself as a service called “BladeLogic,” a service name no doubt designed to mimic another BMC product called BMC BladeLogic Automation Suite.
  • According to a trusted Krebs source who uses mostly open-source data to keep tabs on the software and hardware used in various retail environments, BMC’s software is in use at many major retail and grocery chains across the country, including Kroger, Safeway, Home Depot, Sam’s Club and The Vons Companies, among many others.
  • Initial entry into the network is suspected to have been facilitated by a SQL injection attack, according to Malcovery.
  • Update: BMC says it is working with McAfee to investigate
  • Krebs: WSJ says that vendor credentials that were used in the attack may have been from vendor other than BMC
  • Additional Coverage – Ars Technica

Google breaks itself, and then fixes itself, while Engineers are busy on Reddit

  • At 10:55 a.m. PST this morning, an internal system that generates configurations—essentially, information that tells other systems how to behave—encountered a software bug and generated an incorrect configuration.
  • The incorrect configuration was sent to live services over the next 15 minutes, caused users’ requests for their data to be ignored, and those services, in turn, generated errors.
  • Users began seeing these errors on affected services at 11:02 a.m., and at that time our internal monitoring alerted Google’s Site Reliability Team. Engineers were still debugging 12 minutes later when the same system, having automatically cleared the original error, generated a new correct configuration at 11:14 a.m. and began sending it; errors subsided rapidly starting at this time.
  • By 11:30 a.m. the correct configuration was live everywhere and almost all users’ service was restored.
  • Reddit AMA
  • Additional Coverage – Reuters
  • Additional Coverage – TechCrunch
  • Additional Coverage – FoxNews

Feedback:

Round-Up:

The post Google's Automated Outage | TechSNAP 147 first appeared on Jupiter Broadcasting.

]]>
Packets Over 90,000 | TechSNAP 102 https://original.jupiterbroadcasting.net/34026/packets-over-90000-techsnap-102/ Thu, 21 Mar 2013 16:48:28 +0000 https://original.jupiterbroadcasting.net/?p=34026 A CloudFlare outage takes down three quarter of a million sites, we’ll tell you what went wrong.

The post Packets Over 90,000 | TechSNAP 102 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A CloudFlare outage takes down three quarter of a million sites, we’ll tell you what went wrong.

Some old school malware gets the job done, Allan’s cool toys from Japan, a big batch of your questions our answers, and much more on this week’s TechSNAP.

Thanks to:

Use our code hostdeal4 to score economy hosting for $1 a month, for one year.

35% off your ENTIRE order just use our code go35off4 until the end of the month!

 

Visit techsnap.ting.com to save $25 off your device or service credits.

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension:

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension:

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension:

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension:

  • Jupiter Broadcasting Affiliate Extensions for Chrome and Firefox
  • Shop Amazon – Year End Deals

    W3 Total Cache (a popular wordpress plugin) may expose sensitive data

    • W3 Total Cache is a very popular and powerful caching plugin
    • The recently discovered problems are technically a configuration error, not a vulnerability, but because it is the default configuration, most sites are vulnerable
    • It can provide significant speed gains over stock wordpress
    • Page Cache – By creating flat .html versions of the page after it is dynamically generated, subsequent anonymous visitors can be shown the cached version of the page, significantly reducing server load and response times
    • Database Cache – By caching the results of database queries, if the same read query needs to be is executed again, the cached result can be used, significantly reducing the number of database queries required to render a page
    • Object Cache – A higher level cache than the database cache, Objects may be constructed from the results of many queries and plugins, caching the complete object may result in significant page load time improvements
    • Minify Cache – By removing comments and whitespace from .css and .js files and gzipping them, less bandwidth is required to download the file
    • JS and CSS Combining – By combining many files into only 1 or 2 files, the total number of requests to the server is reduced, which can markedly improve performance
    • CDN Offloading – W3TC can automatically change the URLs of content such as .css and .js files in addition to media such as images and thumbnails. My loading these content from a CDN instead of the main site, users get faster responses and the site gets reduced load. W3TC can also use multiple subdomains for the loading, allowing it to take advantage of browser’s parallel downloading features
    • All of these caches offer a number of numbers, allowing you to choose between caching to disk, advanced caching to disk, Opcode caches such as APC or dedicated caches such as memcache
    • All of these features make W3TC very popular and well respected
    • However, W3TC defaults to disk based caching because it does not require any additional configuration or server side features (such as APC or the IP address of a memcache server)
    • The problem stems from the fact that W3TC keeps its database and object caches in a web accessible directory (alongside the page and minification caches, which need to be web accessible)
    • This means that if your web server is configured to allow directory listing, any visitor can browse to /wp-content/w3tc/dbcache and see a list of all of the items in your database cache, and by downloading and analyzing these files, they may be able to recover sensitive information, such as the hashed passwords of users or administrators
    • If an attacker were to get the password hash for an administrative account, if they brute forced that hash, they could then take over that wordpress installation
    • Disabling directory indexing does not entirely solve the problem, as the filenames of the cache objects are the md5 hash of the string: w3tc${host}${site_id}_sql_${query}
    • You should configure your web server to deny access to the /wp-content/w3tc/dbcache , /wp-content/w3tc/objectcache and /wp-content/w3tc/log directories (using .htaccess will work for apache)
    • If you use an Opcode cache, or Memcache, you site is not affected by this configuration error
    • Make sure your memcache instances are secured, as if they are publicly addressable, any information cached in them may be accessible
    • The creators of W3TC are working on an update to address the issue
    • Allan’s slides on improving your Blog with ScaleEngine

    Inventor of SSH warns that improper key management makes SSH less secure than it should be

    • This news story has created a significant amount of FUD due to the general media’s lack of understanding of what SSH is and what it does
    • SSH is not vulnerable or compromised
    • The story started with an interview of Tatu Ylonen, the inventor of SSH
    • “In the worst-case scenario, most of the data on the servers of every company in the developed world gets wiped out."
    • The problem is actually caused by users, and bad management practises
    • Users often generate many SSH keys, and store them unencrypted in predictable locations (~/.ssh/id_rsa) where they may be stolen if someone compromises their account or the server they are stored on
    • Many logins, especially those that are shared, will contain large authorized_keys files, allowing many keys to access that account, often these lists are not pruned because keys are hard to identify
    • While auditing a large financial institution, auditors found more than 1 million unaccounted-for keys — 10 percent of which granted root access, or control of the server at the most basic level
    • federal rules for classified computer networks cover the “issuance and assignment and storage of keys” but do not dictate what should be done with used keys. Auditing guidelines require that administrators be able to enumerate exactly who has access to specific systems, but often times SSH access is not properly accounted for, as each line in the authorized_keys file is not easily linked to a specific person, and the control of those keys is not guaranteed
    • A stolen SSH key is what lead to the compromise of the FreeBSD Packaging Building Cluster last month
    • It is recommended that companies refresh keys on a regular basis and remove old keys to prevent them being used to access sensitive servers, although most companies do not have such a policy
    • Tools such as puppet can help with the management of authorized_keys files across a large number of servers, but it is up to the user to ensure the security of their private key
    • One solution to this problem may be a new feature of OpenSSH that allows it to be configured to check the results of a command, before optionally checking the authorized_keys file
    • This feature can be used to check for keys in directory services such as LDAP or Active Directory, simplifying the administration of multiple servers and SSO by storing cannonical keys in a central location

    Feedback:

    Round-Up:

    Amazon Book:
    [asa]B003F3PKTK[/asa]

    Audible Book Pick: The Master Switch: The Rise and Fall of Information Empires Audio Book

    The post SSH FUD Busting | TechSNAP 90 first appeared on Jupiter Broadcasting.

    ]]> The Human Factor | TechSNAP 75 https://original.jupiterbroadcasting.net/24596/the-human-factor-techsnap-75/ Thu, 13 Sep 2012 15:46:38 +0000 https://original.jupiterbroadcasting.net/?p=24596 It was a tough week for the cloud, we’ll run down the list and summarize what happened to the services we all depend on so much!

    The post The Human Factor | TechSNAP 75 first appeared on Jupiter Broadcasting.

    ]]>

    post thumbnail

    It was a tough week for the cloud, we’ll run down the list and summarize what happened to the services we all depend on so much!

    Plus a big batch of your questions, our answers, and a rocking round-up!

    All that and a lot more, on this week’s TechSNAP.

    Thanks to:

    Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

    SPECIAL OFFER! Save 20% off your order!
    Code: go20off5

    Pick your code and save:
    techsnap7: $7.49 .com
    techsnap10: 10% off
    techsnap11: $1.99 hosting for the first 3 months
    techsnap20: 20% off 1, 2, 3 year hosting plans
    techsnap40: $10 off $40
    techsnap25: 25% off new Virtual DataCenter plans
    techsnapx: 20% off .xxx domains

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

GoDaddy outage was caused by router snafu, not DDoS attack

  • GoDaddy’s services started to drop off of the internet
  • The outage lasted approximately 6 hours, from 10:00 PDT (17:00 UTC) and being fully restored about 16:00 PDT (23:00 UTC)
  • A twitter account, claiming to represent part of Anonymous, took responsibility, claiming to have launched a massive DDoS attack against GoDaddy
  • Some news outlets and blogs misunderstand what a DDoS attack is, and report that Anonymous has hacked GoDaddy
  • “We have determined the service outage was due to a series of internal network events that corrupted router data tables.” – Interim Godaddy CEO Scott Wagner
  • The issue was compounded because the downtime affected not only GoDaddy hosting customers, but also customers that only used GoDaddy for DNS
  • GoDaddy hosts 5 million web sites and manages a total of 52 million domain names
  • For example, the DNS for jupiterbroadcasting.com is hosted at GoDaddy, while the actual site resides at ScaleEngine, but because the DNS was down, viewers were unable to lookup the IP address of jupiterbroadcasting.com in order to connect to ScaleEngine
  • DNS caching will have helped reduce the effect of this downtime somewhat, especially for more popular sites, and for users coming from larger ISPs, the DNS records for JB have a TTL of 1 day, so users would only have issues reaching the site if the records had not yet been cached, or once the cache expired. At the time of this writing, the records for JB still had 28461 seconds left in my local Google Public DNS cache, but we not cached at my local OpenDNS
  • This event ruined GoDaddy’s previous 99.999% uptime record for DNS (99.999%, or 5 nines as it is called in the industry, allows for only 6 minutes of cumulative downtime in an entire year, compared to 4 nines, which allows about 53 minutes of downtime per year, or 99.9% which is nearly 9 hours)
  • GoDaddy uses Anycast for the DNS servers, this means that while it looks like each domain is only assigned to 2 DNS servers, each of those two IP addresses actually exists in multiple data centers around the world. Traffic is routed to the closest server, and if that servers route fails, after a few minutes the BGP routers at your ISP or an intervening transit provider route the traffic to the next closest server
  • However, due to what I assume was some human error after the failure of one or more network components, the routes that GoDaddy broadcasted to their upstream providers were in some way incorrect, and caused traffic to no longer reach the GoDaddy servers
  • Anycast is commonly used for DNS but is not very often used for TCP based services due to the fact that the routes can change at any time, and suddenly the same IP address points to a different server, and your connection is dropped. There are some cases where people have successfully used Anycast for short lived TCP connections
  • Additional Coverage
  • Go Daddy Site Outage Investigation Completed – GoDaddy.com

Blue Toad comes forward as the source of the leaked Apple UDIDs

  • Security researcher David Schuetz was analyzing the the data posted online, and found an unusually large number of devices that mentioned Blue Toad, 19 out of the 1 million records analyzed
  • Schuetz then contacted Blue Toad to report what he had found
  • Schuetz also said he couldn’t say conclusively if Anonymous’ claims about the FBI were false or true
  • Blue Toad makes apps for publishing companies, long known for collecting extensive data about their readers for market research and marketing purposes
  • Paul DeHart, CEO of Blue Toad said his firm would not be contacting individual consumers to notify them that their information had been compromised, instead leaving it up to individual publishers to contact readers as they see fit
  • The company’s forensic analysis claims to show the data had been stolen “in the past two weeks”
  • This is contrary to the original claim that the data was stolen from an FBI computer months ago

Feedback:

Round-Up:

The post The Human Factor | TechSNAP 75 first appeared on Jupiter Broadcasting.

]]> DHCP Attacks | TechSNAP 43 https://original.jupiterbroadcasting.net/16601/dhcp-attacks-techsnap-43/ Thu, 02 Feb 2012 20:29:53 +0000 https://original.jupiterbroadcasting.net/?p=16601 Find out how a simple system update brought DreamHost down for nearly two days, and we answer frequently asked DNS questions!

The post DHCP Attacks | TechSNAP 43 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Find out how a simple system update brought DreamHost down for nearly two days, and how the MS Updater Trojan works.

PLUS: We answer frequently asked DNS questions, and a war story you’ll never forget!

All that and more, on this week’s TechSNAP!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Super special savings for TechSNAP viewers only. Get a .co domain for only $7.99 (regular $29.99, previously $17.99). Use the GoDaddy Promo Code cofeb8 before February 29, 2012 to secure your own .co domain name for the same price as a .com.

Pick your code and save:
cofeb8: .co domain for $7.99
techsnap7: $7.99 .com
techsnap10: 10% off
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans
Deluxe Hosting for the Price of Economy (12+ mo plans)
Code:  hostfeb8
Dates: Feb 1-29

   

Direct Download Links:

   

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

 

Subscribe via RSS and iTunes:

   

Show Notes:

Ongoing targeted attacks against defense and aerospace industries

  • The research provides detailed analysis of the ‘MSUpdater Trojan’
  • The trojan was mostly spread using targeted spear phishing attacks, emailing people who would have access to sensitive information
  • The goal of the remote administration trojan was to steal sensitive or classified information about aerospace or defense designs
  • The trojan changed rapidly to avoid detection, and used a variety of methods to infect computers, including zero-day PDF exploits, fake conference invitations (usually specifically targeted to the recipient area of interest, including ISSNIP, IEEE Aerospace Conference, and an Iraq Peace Conference)
  • Communications between the infected machines and the C&C servers often took the form of HTTP traffic using the URL structure of Microsoft Windows Update (where the trojan got its name) and Windows Error Reporting likely to avoid detection by some IDSs and manual traffic analysis. Other versions of the trojan included fake google searches with encoded parameters
  • The trojan dropped was able to detect that it was being run in a virtual machine, and if so would not attempt to infect the machine. This allowed it to go on undetected for a longer period of time and until discovered, hampered its analysis by researchers
  • Outline by Researchers
  • Research and Analysis of the Trojan
  • Research paper on detecting Virtual Machines

DreamHost suffers massive outage due to automated Debian package updating

  • DreamHost had a policy where they would automatically install the latest packages from the their repository on all of their machines, including VPS and Dedicated servers rented to customers
  • Something in one or more of these packages caused some dependencies to be uninstalled resulting in Apache, the FTP server and in some instances, MySQL being uninstalled or unable to start properly
  • DreamHost is a very large attack target due to the number of servers and domains that they host, they must work diligently to ensure updates are applied to prevent massive numbers of machines from becoming compromised
  • DreamHost has to manually resolve many of the dependencies was unable to fix the issue in an automated fashion, requiring hands on admin time on each individual server and VPS
  • DreamHost has now changed their policy regarding updates, where they will now test all of the packages from Debian extensively before they are pushed to all customer servers

Feedback

Q: Chris D asks about monitoring solutions

A: I personally use Nagios + NagiosGraph for my monitoring, although I have also experimented with Zabbix recently. We discussed a number of monitoring applications in TechSNAP 20 – Keeping it up . Nagios configures each host/service from files, but supports extensive templating and host/service groups, allowing you to quickly configure servers that are nearly identical. Zabbix is powered by a database, which is both a pro and a con, but the main advantage I gave to NagiosGraph was that the historical data is stored in RRD files rather than a database, meaning it is aged to require less space. Zabbix by default deleted old data to avoid accumulating massive amounts of data.

Chris uses: monitor.us (want’s them to sponsor us)
Allan has monitoring included in his DNS Failover Service from DNS Made Easy
*

Q: Joshua asks about DNS A Records vs CNAME Records

A: If the CNAME is inside the same domain, the authoritative server will usually return the result with the response for the CNAME. For example, if static.example.com is a CNAME to www.example.com, the A record for www.example.com will be included in the response. However if the CNAME is for something like example.cdn.scaleengine.net then a 2nd lookup is required. To answer the second part of your question, it is not possible to do an HTTP redirect at the DNS level, so NGINX is the best place to do it, if done correctly this redirect can be cached by Varnish to avoid any additional latency. You could hard-code the redirect in to Varnish as well. I applaud your use of a cookieless domain for your static content.


War Story

This week’s war story is sent in by Irish_Darkshadow (the other other Alan)


The Setting:

IBM has essentially two “faces”, one is the commercial side that deals with all of the clients and the other is a completely internal organisation called the IGA (IBM Global Account) that provides IT infrastructure and support to all parts of IBM engaged with commercial business.

The events described here took place in early 2005.

The Story:

There is an IBM location in Madrid, Spain which was stafffed by about two thousand people at the time of this war story. The call centre in Dublin was tasked with supporting the users in that site and every single one of them had been trained in what I called “Criticial Situations – Connectivity Testing”. The training took about 4 hours to deliver and was followed up with some practical tests over the next two weeks to ensure the content was sinking in. There was also some random call recording done to detect the techniques being used on live calls too.

Early one morning a call came in to the Spanish support line from a user who had arrived to work late and was unable to get access to her email server. The agent immediately started to drill into the specifics of the problem and realised that the user simply had no network connectivity to her email. The next step in the training says to establish whether the user actually has partial connectivity or a complete loss. The agent began with a simple IPCONFIG /ALL and noticed right away that the user had a 192.168.x.x IP address. This is quite an unusual thing to get on a call from an internal IBM user and the agent didn’t know what to do next and started to get some empirical data before escalating the issue. The key question was – are you the only user affected? The user confirmed that everyone around her was working away with no issues.

The team leader for the Spanish support desk picked up on the call and decided to call my team for some troubleshooting tips. I dropped over to the call and started listening in (which was useless as it was all in frickin’ Spanish) in the hopes of catching something “weird” from the call. The 192 address piqued my curiosity so I had the agent check for a statically assigned IP address…the XP based computer the user was operating was set to use DHCP. Hmmmm…

While this call really started to gain my interested I started hearing of other calls beginning to come in from other users in the same building with the same problem. The agents on those calls were able to confirm to me that these users were on different floors than the original user. So I now had a building on my hands that was slowly losing connectivity to these 192 addresses and the only possibility was a rogue DHCP server.

I suspected that the network topology and physical structure was about to play an important part in isolating the problem so I called up the onsite technicians and managed to get one who knew the building and the network inside out. Each floor of this 20+ floor building has a comms room where 24 / 48 port switches were used to supply each area of the floors. The best part was that this guy actually had a map of which ports were patched to which desks for every floor.

Now that I was firmly into Sherlock Holmes mode I asked the onsite guy to arrange some teams for me. For each of the know affected floors I needed a tech in the comms room and another testing computers. We had hatched a plan to start from the original floor that was affected by unpatching one switch at a time from the building network and doing a release / renew on a PC in that newly unpatched section to see if we got a 169.254.x.x address. If that happened then we knew that the rogue DHCP server was not in that specific section (clever eh? what do you mean no? well screw you, you werent’ there man…it was a warzone!). We repeated this pattern for five floors with no success so we expanded one floor up and one floor down. Eventually one of the techs ran the test and the PC picked up a new 192.168.x.x lease…..we had the root of the problem within our grasp and it was time to close the net (too much? I’m trying to make this sound all actiony….it my head it has AWESOME danger music).

The onsite guys managed to check every PC in the suspect floor area and the rogue server was still not found. They yanked the cable from every PC in the area and while the rest of the building was recovering, we knew that if we repatched this section that the problem would spread again. When all the PCs were disconnected, I asked the onsite guy to check the switch for activity and there was still one port showing traffic. Despite having all the PCs on the floor disconnect…the rogue was still operational. I questioned if there were any meeting rooms or offices on the floor and there was one. AHA! Upon closer inspection, the empty office had a laptop on the desk that was showing activity on the NIC lights. They yanked the cable and tested a PC on the floor…..169.254.x.x…SUCCESS. The switch was repatched to the building network and all of the PCs recovered. The technician I had called originally started to cackle maniacally over the phone. Perhaps it was better described as derisive laughter. Apparently the door to the office that housed the rogue DHCP laptop had a sign on it that read – IT Manager!!!

When we managed to get a full post mortem / lessons learned done it turned out that the IT Manager had arrived to the building about an hour after most users start work and half an hour prior to the arrival of the original caller to the Dublin support centre. So every user who worked normal hours had arrived to work and gotten a valid IP lease. Then the IT Manager showed up, connected his laptop and buggered off to a meeting. 192.168.x.x addresses started getting issued. At that point the original user arrives to work, gets a bad IP and calls the support desk. It turned out that over the weekend the IT Manager had enabled Internet Connection Sharing so that his daughter could get online through the broadband on the laptop from her home PC. He hibernated the laptop, forgot all about the ICS being enabled and just connected it up at work that morning without even thinking about it .

Sometimes, late at night….I can still hear that derisive laughter and it makes me sad when I think of all those IT Managers out there who can do stupid shit like this and yet retain their positions!


It just goes to show, that the methodical approach may not always be the fastest approach, but because it solves the problem every single time, it usually results in a faster resolution and a better understanding of what the issue was.


Round Up

The post DHCP Attacks | TechSNAP 43 first appeared on Jupiter Broadcasting.

]]> Perfect Passwords | TechSNAP 11 https://original.jupiterbroadcasting.net/9666/perfect-passwords-techsnap-11/ Thu, 23 Jun 2011 23:38:50 +0000 https://original.jupiterbroadcasting.net/?p=9666 We cover why you always want a little salt with your passwords, and what makes a secure passowrd. !Plus Dropbox’s shockingly bad security issue this week!

The post Perfect Passwords | TechSNAP 11 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’ve got the details of an FBI raid that knocked several popular sites off-line.

The WordPress plugin repository was compromised, and backdoors were added to a few popular plugins, and we’ll share the details.

Plus Dropbox’s shockingly bad security issue this week, and we’ll cover why you always want a little salt with your passwords!

All that and more, on this week’s TechSNAP!


Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

[ad#shownotes]

Show Notes:

TechSNAP has a new Sub-Reddit, submit links and questions for the show, and vote away!


Topic: FBI raids data center and takes 3 entire racks

  • At 1am on Tuesday the FBI raided the Virginia, USA data center of Swiss web hosting company DigitalOne.
  • DigitalOne’s website was still offline late Wednesday
  • DigitalOne does not have any staff on-site, and relies on remote hands from the data center operator, CoreSite. DigitalOne was not aware of what the problem was until hours later when the data center contracted them and passed along the name of the agent in charge and a phone number for DigitalOne to contact the FBI.
  • When requested DigitalOne had given the FBI information on the IP address they inquired about and told them the exact location of the server. However the FBI seized 3 entire racks of servers rather than only the server they were after.
  • There are rumours that this raid was related to an investigation in to LulzSec
  • A number of services like Pinboard and Instapaper were effected.

Topic: WordPress.org gets hacked, plug-ins compromised

  • WordPress.org is not sure exactly what happened
  • Plug-in repository compromised
  • Malacious code was found in commits to popular plugins like W3 Total Cache, AddThis and WPTouch
  • WordPress took the prophylactic step of forcing all users to reset their passwords to prevent any further compromised code from being pushed out.

Topic: Adobe patches two 0-day exploits in 9 days

  • Adobe issued a second ‘out of band’ security update for Flash player in only 9 days due to another exploit
  • Reportedly, one of the 0-day exploits was being used to steal users’ gmail passwords
  • The vulnerability was listed as critical, as it might allow an attack to take complete control of a system
  • Nightmare scenario is a trusted page is compromised and flash malware is inserted
  • Make sure you update to the latest version of Adobe Flash

Topic: Dropbox goes passwordless, for 4 hours

  • A flaw at dropbox allowed users to login with any password, and access the account
  • This means anyone who knew your email address could have accessed your account and files. They could have authorized additional devices so they can continue to access your files even once this flaw was fixed.
  • Dropbox claims less than 1% of users logged in during that time (seems low)
  • Official Notice from Dropbox
  • If dropbox used proper encryption with one key per user, files could not be accessed without the correct password. However this security measure would take away a lot of the ‘easiness’ of dropbox that people are so fond of.

Topic: Bitcoin currency exchange compromised

  • The major bitcoin currency exchange MtGox had it’s database compromised and was taken offline when a large number of fraudulent trades were made, swinging the market.
  • The compromised account sold all of it’s coins, forcing the market price down, then bought them all back, and tried to cash out
  • Accounts that had not been used recently, had not had their passwords upgraded from the original unsalted md5 hash to the standard FreeBSD crypt() md5 salted hash.
  • MtGox managed to get a hold of someone at google and google forced all users with gmail accounts at MtGox were forced to reset their passwords
  • Once MtGox is back up, they plan to switch to SHA-512 salted hashes.
  • MtGox claims that the computer of a 3rd party auditor who had read-only access to the database was compromised, and then insecurely hashed passwords were cracked and those accounts were then used by the attackers.

Q: (Keith) Can you explain salted hashing and two factor authentication in more detail?
A: Some websites, especially older forums and bespoke software, will store your password as a plain md5 or sha1 hash. These can easily be broken by a rainbow table, and can also be brute forced rather quickly using GPUs. To protect passwords against rainbow tables, modern password hashing algorithms use a ‘salt’. A salt is just some random characters added to the password to make it better. In the FreeBSD crypt() MD5, the default is 8 base64 characters. This means that the rainbow table would have to include those extra 8 possible characters to be able to crack the password. Also, the salt is different for each account, so that means a separate rainbow table would be required for each user, and that two users with the same password won’t have the same hash. What many people don’t realize when they try to implement their own password hashing using regular md5, is that the FreeBSD crypt() md5 does 100 rounds of hashing, not just one. This was sufficiently slow when ti was design, but is much less so now. That is why other algorithms, like SHA-512 and Blowfish have become more popular. On top of having larger salts (16 and 22 characters respectively), they use an adjustable number of rounds of the hashing algorithm. This allows the administrator to decide on a performance/security trade off that best fits their needs.
Lecture notes by Allan on how Password Hashing Works

To answer the other part of your question, multi-factor authentication means using more than one way to confirm the user is who they claim to be. Two-factor authentication just means using 2 of the 3 factors to confirm the users identity, rather than just one. The three types are:

  • Something you know (username/password, secret question, pin #)
  • Something you have (ID card, security token, RFID, Cell phone)
  • Something you are (Fingerprint, Retina Scan, Signature, Voice sample)

So, the typical ATM card system, is who factor authentication, something you have (bank card) and something you know (pin number), however, the pin number is not a very strong authenticator. As we’ve seen in recent weeks, even a security token can be compromised, and some forms of attack like the ZeuS trojan, just wait until you authenticate to perform their attack.


Bitcoin Blaster:

AMD Announces new Fusion System Architecture – How will this effect bitcoin mining?
Symantec finds virus that steals your bitcoins

Lulz Roundup:

LulzSec’s Primary tool? Havij v1.14 Advanced SQL Injection
FAKE: LulzSec supposedly claims its biggest coup yet: The entire UK 2011 Census
LulzSec Ring Leader Arrested
LulzSec-Exposed (counter hacking group) claims authorities are closing in
LulzSec teams up with Anonymous for Operation AntiSec

Lightning Round:

Mozilla End-of-Life’s Firefox 4 – No more security updates
Google builds plugin to detect unsafe DOM operations like XSS

Download & Comment:

The post Perfect Passwords | TechSNAP 11 first appeared on Jupiter Broadcasting.

]]> Champions / Marvel | MMOrgue 3 https://original.jupiterbroadcasting.net/8861/champions-marvel-mmorgue-3/ Sat, 28 May 2011 03:00:49 +0000 https://original.jupiterbroadcasting.net/?p=8861 In this week’s MMOrgue, we’re digging up the dirt on the world of superhero MMOs!

The post Champions / Marvel | MMOrgue 3 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

In this week’s MMOrgue, we’re digging up the dirt on the world of superhero MMOs! Join us as we don our capes and tights to take a look at the latest troubling reports from inside Marvel Universe Online, as well as examine the effects that SOE’s network security issues and subsequent outage have had on DC Universe Online.

Last but not least, we examine the announcement that Atari is parting ways with Champions Online developer, Cryptic Studios. What has motivated this divestment, and what could this mean for the studio’s future and existing projects?

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | YouTube

MMOrgue iTunes Feeds: MMOrgue RSS Feeds:
HD Video
iPad & Apple TV Video
iPod Video
MP3 Audio
HD Video RSS
Large Video RSS
Mobile Video RSS
MP3 Audio RSS

Show Notes:

First, to respond to some feedback:

“The dark theme and name do not suit the show’s content.”

  • First the obvious reasoning behind the name: Everybody talkes about MMOs, and everybody considers themselves an expert worthy of a name and brand. Hence, MMO-everything is taken. I kid you not.
  • More importantly, the concept of looking at the inner workings of a living industry is very much in line with the idea of cataloguing and studying our dead.
    • I chose this theme and name to illustrate a scientific and analytic approach to the stories that will be covered herein.
    • The communities, technologies, and professionals of this industry are very much the heart, lungs and brains of any MMO. Without analysing what motivates and drives any of these, we potentially lose sight of the whole.
  • And lastly, the MMO industry is a dangerous place. Covering titles and technologies that are dead, and finding out what put them there, is something that WILL be covered on this show.

“You need a co-host.”

  • If this was a show about sharing the latest press releases and announcements, I would be inclined to agree. Finding commentary and conversation on such topics is easy, and flows best between separate minds.
    • However, as this show is 100% editorial driven, the content is created from the mind of its host. Increasing the number of minds involved would only fragment the content and any opinions contained herein.
  • That said, there will occasionally be important industry events which either slip my radar, or about which I know too little to accurately form an editorial opinion.
    • In these circumstances, I intend to invite “correspondents” to join me on air to discuss those particular situations. If you feel as though you would like to become a correspondent, please contact me by posting at jupitercolony.com, or by emailing jeremy@jupiterbroadcasting.com, to start a discussion on what content you would like to present to our audience.

DCUO and SOE outage

  • Infographic
  • On May 2nd, SOE went dark. Then hundreds of thousands of gamers cried out in frustration, and never went silent.
  • It took almost two weeks to get the network, and all of Sony’s games, back up and running and (apparently) secure from further invasion. That outage is estimated to have cost SOE a total of $171 million.
  • And this is AFTER a fiscal year that ended in March, which reported an annual loss of $3.2 billion for the company.

What does this rough patch mean for the future of DCUO?

  • Nobody at SOE is making any official statements yet, other than to say that DCUO’s population is currently “very good.”
  • In the past 3 months, there have been two replacements among the DCUO project’s upper management that were made from within … existing execs taking on extra responsibility instead of promotions, or new hires.
  • And this after the project suffered a round of layoffs in April.
  • It is likely that subscriptions will see a noteworthy drop due to the outage. Even with the incentives being offered by SOE by way of apology.
    • This comes down to Consumer Confidence, which is fancy way of saying “people don’t like to be jerked around.”
    • SOE has a large overhead, capable of supporting a few rocky patches. Even so, they’ve been known to shut down games (Matrix Online).
  • GOOD NEWS: Apparently this outage scared SOE into being more interactive with their customers, and their forums are now ablaze with Dev Posts at regular intervals sharing REAL info instead of SOE’s standard practice of silence and mystery.
    • Let’s hope it lasts.

MegaServers

  • Just days before the SOE network outage, it was announced that ALL of the existing DCUO servers would soon be merged into a few instanced networks called “MegaServers.”
  • Through the use of “phasing” technology, players will still be participating in areas that will have reasonable populations.
  • The benefit of this is to allow all of the back-end queueing for Raids, Duos, Alerts, and PvP to work across ALL players (on a per-platform basis).
  • The idea of server mergers has always been seen as a bad thing by the MMO press. It indicates a population decline, and a lack of interest.
    • This MAY be different, as this sounds more like a fundamental tech shift, and not just a run-of-the-mill merger.
    • However, it is still addressing an issue that would not be present if the game had a large and active population of gamers (queue times for instanced content).
  • Community outcry of “name collision” issues, and lack of solid responses from SOE, are causing additional schisms and rage among players.

Champions Online – Atari divests itself from Cryptic

https://www.gamasutra.com/view/news/34704/Atari_Drops_Champions_Online_Developer_Cryptic_Studios.php

First, rumor killing:
– Nothing is happening YET. Atari has only announced their INTENT to divest. They have not announced that they are seeking a buyer, nor that any change of staff will occur as a result of this decision.

Atari is making a Bad Choice

  • Investing in casual markets
    • Casual / Facebook games do not create brand recognition, fan loyalty or press.
    • As this market continues to mature, games will become more and more complex and impressive until their development budgets rival current standalone titles.
    • Long-term investment in this area will continue to require more and more finances to remain competitive. It is not a quick and cheap money-maker market.
  • Profits continue to rise
    • 17.3 million prior year, 7 million this year, next year = ??
    • While actively developing at least one unreleased title – Neverwinter
    • Early indications that Champions Online move to F2P has resulted in huge increase in profits, which only occurred in Q3 of 2010.
  • Foundry Tech
    • No other MMO has created such a successful and robust UGC tool, and it is now available to be ported to all titles using the Cryptic Engine: STO, CO and NWO.
    • Giving the power of content creation to users opens up new doors to new types of gamers, and creates a powerful sense of community.
    • Other MMO devs would probably love to get their hands on this technology…

Independence for Cryptic?

  • In today’s MMO landscape, no Dev survives alone.
  • They all need a publisher, and most publishers end up owning the Dev studio
    • Blizzard was acquired by Activision in 2007
    • Bioware became a part of EA in 2007
    • Turbine, the biggest example of a successful “indie” developer, was purchased by Warner Bros in 2010.
  • To date, no major developer has managed to leave its parent publishing company, and survive. In fact, it’s such a risky prospect that studios typically just dissolve rather than even attempt it.

So then, who buys Cryptic?

  • I think it’d be a bit presumptuous for me, as a gamer and not a financial analyst, to try and make an educated guess on this one.
  • MMORPG.com has a couple good editorials that cover most of the major candidates in this area. Check the show notes for details, as I don’t have much else to add to the discussion at this point.
  • Fans of Star Trek Online are hoping that the company is acquired by CBS, the IP holder of the Star Trek franchise.
    • Would CBS be interested in entering the online gaming arena? They haven’t yet.

Future of Neverwinter IP?
Possibly the biggest question mark in all of this…

  • Atari holds publishing rights on all Dungeons & Dragons products until 2017.
  • A lot of money and time already invested in the project, including a co-publishing deal with a line of novels written by R.A. Salvatore, and a deal with Wizards of the Coast for additional tie-ins.
  • Unlikely that Atari will let this one go completely.
    • It will either get pulled from Cryptic and given to another studio with Atari maintaining their publishing oversight, or a new deal will be worked out to keep Atari on board in spite of their divestment from the studio.
    • Either option discounts the title from being a bargaining tool in obtaining a new investment partner.

Marvel Universe

F2P

  • Attempting to live under the title of “First ever AAA F2P MMO in the West, at time of launch”
    • Color me completely unimpressed.
    • First of all, you can’t CLAIM a title like “Triple-A” without having a product. At this time, with the total lack of game footage, screenshots, timelines for beta/release, or even branding… what is here to lay claim to?
    • This just sounds like empty hype, from a company that has already started disappointing us with overblown hype for their other unlaunched MMO, Jumpgate:Evolution.

No Character Customization
Rank this as my “most worrying” concern for this title.

  • On the one hand, it will allow players to jump into game as iconic well-known superheroes from the Marvel franchise.
    • A lot of people will find this appealing, as evidenced by the outstanding sales records for single-player superhero titles like “Ultimate Alliance.”
    • Developers at Secret Identify Studios claim this will make everyone feel more heroic, and “we won’t be merely ‘sidekicks.’”
      • EMPTY CLAIM — CO allows heroes to feel like heroes, and even have their own Nemesis with minions and a base. What sidekick has that?!
  • On the other, how many Wolverines and Hulks will be roaming around? Or will each server have only one instance of each? Where’s the “massive” in this MMO, if that’s the case?
    • And how about progression? If you have to unlock the powers of your favorite superheroes, how do you explain them losing their abilities at the start of the story?
  • Possibly one of the biggest selling points of superhero MMOs to date, has been character customization. CoX and CO had it in droves, and DCUO’s comparative lack of options brought them a lot of criticism from MMO players and press.
    • This is a technological step backwards, and will only work if this is NOT a true MMO as we’ve come to define it.
    • If this is just another “X-Men Legends” or “Ultimate Alliance” with robust online matchmaking services, then it could work.
    • But any form of persistence, progression and community, will be lost without personalization of your avatar.

Written by Bendis
This has the potential to make me excited.

  • Brian Michael Bendis is the godfather of Marvel’s “Ultimate” universe, and creator of some of the most critically acclaimed stories ever to spring from comic books. Including “Avengers Disassembled,” “House of M,” “Civil War,” and “Secret Invasion.”
  • He claims to be writing stories for MUO that will portray some of the most iconic moments from each characters’ lore, and re-imagine them into events that players will experience in-game.
  • Not much else to say about it, really. Bendis has never really done anything ‘wrong’ (except, arguably, killing off Hawkeye… ) so it’s great news for the story side of the game.
  • Between this, and the news that R.A. Salvatore is writing for Cryptic’s “Neverwinter,” it could set a precedence in the industry to bring in more established high-profile writers to flesh out the story of an MMO. Nothing wrong with that at ALL. There’s a reason they are high-profile after all… it’s because they’re AWESOME.

https://www.mmorpg.com/showFeature.cfm/loadFeature/5187/page/1
https://massively.joystiq.com/2011/05/02/the-daily-grind-do-you-think-marvel-universe-is-an-mmo/

—————

Man… this whole episode was a lot of bad news, wasn’t it? And here I was hoping that superheroes were a HAPPY topic of conversation…

Well, maybe next week will turn some of that around…

+ RIFT feedback and discussion
+ 2KGames enters the MMO arena, through a partnership with XLGames (Lineage)
+ Bioware talks Mass Effect MMO

 

The post Champions / Marvel | MMOrgue 3 first appeared on Jupiter Broadcasting.

]]>