Send Link mailing list submissions to
        [email protected]

To subscribe or unsubscribe via the World Wide Web, visit
        https://mailman.anu.edu.au/mailman/listinfo/link
or, via email, send a message with subject or body 'help' to
        [email protected]

You can reach the person managing the list at
        [email protected]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Link digest..."


Today's Topics:

   1. More Salt Typhoon victims: Telcos with Cisco bugs
      (Stephen Loosley)
   2. DOGE?s Coders Launch Website So Full Of Holes, Anyone Can
      Write To It (Stephen Loosley)


----------------------------------------------------------------------

Message: 1
Date: Sun, 16 Feb 2025 00:37:39 +1030
From: Stephen Loosley <[email protected]>
To: "link" <[email protected]>
Subject: [LINK] More Salt Typhoon victims: Telcos with Cisco bugs
Message-ID: <[email protected]>
Content-Type: text/plain; charset="UTF-8"


More victims of China's Salt Typhoon crew emerge: Telcos just now hit via Cisco 
bugs


Networks in US and beyond compromised by Beijing's super-snoops pulling off 
priv-esc attacks


By Jessica Lyons Thu 13 Feb 2025 
https://www.theregister.com/2025/02/13/salt_typhoon_pwned_7_more/


China's Salt Typhoon spy crew exploited vulnerabilities in Cisco devices to 
compromise at least seven devices linked to global telecom providers and other 
orgs, in addition to its previous victim count.

The intrusions happened between December 2024 and January 2025 with the Chinese 
government snoops attempting to exploit more than 1,000 internet-facing 
Cisco-made boxes before successfully breaking into at least seven that were 
unpatched, according to Recorded Future's Insikt Group.

Salt Typhoon previously compromised at least nine US telecommunications 
companies and government networks, giving President Xi's agents real-time 
access to people's communications and whereabouts.

In its latest espionage campaign, the crew infiltrated Cisco-supplied gear 
associated with a US internet service and telecommunications provider, a US 
affiliate of a "significant" UK-based telecom provider, an Italian ISP, and two 
other telecommunications firms, one in South Africa and a "large" one in 
Thailand, Insikt's report [PDF] states. 

https://go.recordedfuture.com/hubfs/reports/cta-cn-2025-0213.pdf

Again, that would give China intimate access to people's internet activities, 
movements, and comms.

"The group likely compiled a list of target devices based on their association 
with telecommunications providers' networks," according to the write-up.

Additionally, the snoops "possibly targeted" more than a dozen universities 
including University of California, Los Angeles to access research related to 
telecommunications, engineering, and technology, according to the infosec 
house, which tracks Salt Typhoon as RedMike.

Plus, in mid-December, Salt Typhoon also conducted a reconnaissance operation 
involving "multiple" IP addresses owned by Mytel, a Myanmar-based telecom firm.

To compromise the targeted Cisco devices, Beijing's spies combined two critical 
privilege escalation vulnerabilities in Cisco's tech: CVE-2023-20198 and 
CVE-2023-20273. The networking giant issued patches for both in 2023, and at 
the time warned the bugs had already been exploited as zero-days.

CVE-2023-20198 is a privilege escalation vulnerability in Cisco IOS XE 
software's web user interface. 
The snoops exploited this one for initial access, and then issued a privilege 
15 command to create a local user and password.

Then, they used the new local account to exploit another privilege escalation 
flaw, CVE-2023-20273, to gain root privileges on the device. This allowed Salt 
Typhoon to add a generic routing encapsulation (GRE) tunnel for persistent 
access to the victim's network.

China's Salt Typhoon spies spotted on US govt networks before telcos, CISA boss 
says
Charter, Consolidated, Windstream reportedly join China's Salt Typhoon victim 
list
FCC to telcos: By law you must secure your networks from foreign spies. Get on 
it
Trump admin's purge of US cyber advisory boards was 'foolish,' says ex-Navy 
admiral
More than half of the targeted devices, in terms of attempts, were in the US, 
South America, and India, with the rest spanning over 100 countries. Most of 
these were linked to telecom providers, while 12 universities were possibly 
targeted to access research related to technology. 

Basically, China wanted to pwn the world's telecommunications networks.

These colleges included, in the US: University of California, Los Angeles 
(UCLA); California State University, Office of the Chancellor; Loyola Marymount 
University; and Utah Tech University. Plus Argentina (Universidad de La Punta) 
and Bangladesh (Islamic University of Technology IUT). Two were in Indonesia: 
Universitas Sebelas Maret and Universitas Negeri Malang.

Other attempted targets were in, at least, Malaysia (University of Malaya), 
Mexico (Universidad Nacional Autonoma), the Netherlands (Technische 
Universiteit Delft), Thailand (Sripatum University), and Vietnam (University of 
Medicine and Pharmacy at Ho Chi Minh City).

After it emerged last year that Salt Typhoon had struck Verizon, AT&T, Lumen 
Technologies, and others, and thus China was in a position to monitor millions 
of people's calls, texts, locations, and internet activities, Uncle Sam urged 
IT departments to tighten up their network security and netizens to start using 
strong end-to-end encryption for their online chatter.

The kicker in all of this is that, in that previous campaign, Beijing abused 
equipment that provides surveillance backdoors intended for US law enforcement 
to track suspects in American networks to pull off these intrusions.

In January, the US issued sanctions on a Salt Typhoon affiliated cyberscurity 
company, Sichuan Juxinhe Network Technology, which is based in Sichuan, China.

But while the sanctions "signal a more assertive and commendable stance against 
state-backed cyber espionage in critical infrastructure," according to the 
threat hunters, "robust international cooperation is crucial for effectively 
countering these persistent threats."

We strongly advise customers to patch known vulnerabilities that have been 
disclosed

A spokesperson for Cisco told us today that what it knows for certain is that 
the flaws highlighted by Insikt were fixed a few years ago, as we noted.

"We are aware of new reports that claim Salt Typhoon threat actors are 
exploiting two known vulnerabilities in Cisco devices relating to IOS XE," the 
spinner said.

"To date, we have not been able to validate these claims but continue to review 
available data.

"In 2023, we issued a security advisory disclosing these vulnerabilities along 
with guidance for customers to urgently apply the available software fix. We 
strongly advise customers to patch known vulnerabilities that have been 
disclosed and follow industry best practices for securing management 
protocols." 




------------------------------

Message: 2
Date: Sun, 16 Feb 2025 01:07:46 +1030
From: Stephen Loosley <[email protected]>
To: "link" <[email protected]>
Subject: [LINK] DOGE?s Coders Launch Website So Full Of Holes, Anyone
        Can Write To It
Message-ID: <[email protected]>
Content-Type: text/plain; charset="UTF-8"

DOGE?s ?Genius? Coders Launch Website So Full Of Holes, Anyone Can Write To It

(Mis)Uses of Technology

from the this-would-get-an-intern-at-a-coffee-shop-fired dept

Fri, Feb 14th 2025 09:25am - by Mike Masnick
https://www.techdirt.com/2025/02/14/doges-genius-coders-launch-website-so-full-of-holes-anyone-can-write-to-it/


If you want to write something on the U.S. government?s official DOGE website, 
apparently you can just? do that. Not in the usual way of submitting comments 
through a form, mind you, but by directly injecting content into their 
database. This seems suboptimal.

The story here is that DOGE ? Elon Musk?s collection of supposed coding 
?geniuses? brought in to ?disrupt? government inefficiency ? finally launched 
their official website. And what they delivered is a masterclass in how not to 
build government infrastructure. 

One possibility is that they?re brilliant disruptors breaking all the rules to 
make things better. Another possibility is that they have no idea what they?re 
doing.

The latter seems a lot more likely.

Last week, it was reported that the proud racist 25-year-old Marko Elez had 
been given admin access and was pushing untested code to the US government?s $6 
trillion/year payment system. While the Treasury Department initially claimed 
(including in court filings!) that Elez had ?read-only? access, others reported 
he had write access. 

After those reports came out, the Treasury Dept. ?corrected? itself and said 
Elez had been ?accidentally? given write privileges for the payments database, 
but only for the data, not the code. 

Still, they admitted that while they had put in place some security 
protections, it?s possible that Elez did copy some private data which ?may have 
occasionally included screenshots of payment systems data or records.?

Yikes?

Now, you might think that having a racist twenty-something with admin access to 
trillion-dollar payment systems would concern people. But Musk?s defenders had 
a compelling counterargument: he must be a genius! Because? well, because Musk 
hired him, and Musk only hires geniuses. Or so we?re told.

The DOGE team?s actual coding prowess is turning out to be quite something. 

First, they decided that government transparency meant hiding everything from 
FOIA requests. When questioned about this interesting interpretation of 
?transparency,? Musk explained that actually DOGE was being super transparent 
by putting everything on their website and ExTwitter account.

There was just one small problem with this explanation. At the time he said it, 
the DOGE website looked like this:

Black website saying: An official website of the United States Government.

Then it shows a $ logo and "Department of Government Efficiency." "The people 
voted for major reform."

That was it. That was the whole website.

On Thursday, they finally launched a real website. Sort of. If by ?real 
website? you mean ?a collection of already-public information presented in 
misleading ways by people who don?t seem to understand what they?re looking 
at.? But that?s not even the interesting part.

These supposed technical geniuses managed to build what might be the least 
secure government website in history. Let?s start with something basic: where 
does the website actually live? According to Wired, the source code actually 
tells search engines that ExTwitter, not DOGE.gov, is the real home of this 
government information:

A WIRED review of the page?s source code shows that the promotion of Musk?s own 
platform went deeper than replicating the posts on the homepage. The source 
code shows that the site?s canonical tags direct search engines to x.com rather 
than DOGE.gov.

A canonical tag is a snippet of code that tells search engines what the 
authoritative version of a website is. It is typically used by sites with 
multiple pages as a search engine optimization tactic, to avoid their search 
ranking being diluted.

In DOGE?s case, however, the code is informing search engines that when people 
search for content found on DOGE.gov, they should not show those pages in 
search results, but should instead display the posts on X.

?It is promoting the X account as the main source, with the website secondary,? 
Declan Chidlow, a web developer, tells WIRED. ?This isn?t usually how things 
are handled, and it indicates that the X account is taking priority over the 
actual website itself.?

If you?re not a web developer, here?s what that means: When you build a 
website, you can tell search engines ?hey, if you find copies of this content 
elsewhere, this version here is the real one.? It?s like telling Google ?if 
someone copied my site, mine is the original.?

But DOGE did the opposite. They told search engines ?actually, ExTwitter has 
the real version of this government information. Our government website is just 
a copy.? Which is? an interesting choice for a federal agency? It?s a bit like 
the Treasury Department saying ?don?t look at our official reports, just check 
Elon?s tweets.?

You might think that a government agency directing people away from its 
official website and toward the private company of its leader would raise some 
conflict-of-interest concerns. And you?d be right!

But wait, it gets better. Or worse. Actually, yeah, it?s worse.

Who built this government website? Through some sloppy coding, security 
researcher Sam Curry figured out it was DOGE employee Kyle Shutt. The same Kyle 
Shutt who, according to Drop Site News, has admin access to the FEMA payments 
system. The same Kyle Shutt who used the exact same Cloudflare ID to build 
Musk?s America PAC Trump campaign website. Because why maintain separate secure 
credentials for government systems and political campaigns when you can just? 
not do that?

But the real cherry on top came Thursday when people discovered something 
amazing about the DOGE site database: anyone can write to it. Not ?anyone with 
proper credentials.? Not ?anyone who passes security checks.? Just? anyone. As 
404 Media reported, if you know basic database operations, you too can be a 
government website administrator:

The doge.gov website that was spun up to track Elon Musk?s cuts to the federal 
government is insecure and pulls from a database that can be edited by anyone, 
according to two separate people who found the vulnerability and shared it with 
404 Media. One coder added at least two database entries that are visible on 
the live site and say ?this is a joke of a .gov site? and ?THESE ?EXPERTS? LEFT 
THEIR DATABASE OPEN -roro.? 

While I imagine those will be taken down shortly, for now, the insertions are 
absolutely visible:

A page on the DOGE website showing inserted text in a box reading: "THESE 
EXPERTS LEFT THEIR DATABASE OPEN - roro
A page on the DOGE website showing inserted text in a box reading: "This is a 
joke of a .gov site"
Look, there?s a reason we called this whole thing a cyberattack. When someone 
takes over your computer systems and leaves them wide open to anyone who wants 
to mess with them, we usually don?t call that ?disruption? or ?innovation.? We 
call it a cybersecurity breach.

?Feels like it was completely slapped together,? they added. ?Tons of errors 
and details leaked in the page source code.?

Both sources said that the way the site is set up suggests that it is not 
running on government servers. 

?Basically, doge.gov has its codebase, probably through GitHub or something,? 
the other developer who noticed the insecurity said. ?They?re deploying the 
website on Cloudflare Pages from their codebase, and doge.gov is a custom 
domain that their pages.dev URL is set to. So rather than having a physical 
server or even something like Amazon Web Services, they?re deploying using 
Cloudflare Pages which supports custom domains.?

Here?s the thing about government computer systems: They?re under constant 
attack from foreign adversaries. Yes, they can be inefficient. Yes, they can be 
bloated. But you know what else they usually are? Not completely exposed to the 
entire internet. It turns out that some of that inefficient ?bureaucracy? 
involves basic things like ?security? and ?not letting random people write 
whatever they want in federal databases.?

This isn?t some startup where ?move fast and break things? is a viable 
strategy. This is the United States government. And it?s been handed over to 
people whose main qualification appears to be ?posts spicy memes on 4chan.? The 
implications go far beyond embarrassing database injections ? this level of 
technical negligence in federal systems creates genuine national security 
concerns. When your ?disruption? involves ignoring decades of hard-learned 
lessons about government systems security, you?re not innovating ? you?re 
inviting disaster.



Filed Under: cyberattack, doge, doge website, elon musk, kyle shutt, security 
holes, transparency
Companies: twitter, x

49 Comments Leave a Comment


If you liked this post, you may also be interested in...

No Personal Liability For DOGE Yet, But With Two More Lawsuits We Get Closer
Democrats And The Price Of Protection
At Last, DOGE And Musk Are Finally Named In A Lawsuit, Albeit "Officially"
Some Follow Up Questions For Elon Musk, After He Admits He Gets Stuff Wrong 
Sometimes
DOGE May Now Be Aware Of The CFAA But It's Still Violating It, Along With Lots 
Of Other Laws
Comments on ?DOGE?s ?Genius? Coders Launch Website So Full Of Holes, Anyone Can 
Write To It?
Subscribe: RSS
Leave a comment

https://www.techdirt.com/2025/02/14/doges-genius-coders-launch-website-so-full-of-holes-anyone-can-write-to-it/



------------------------------

Subject: Digest Footer

_______________________________________________
Link mailing list
[email protected]
https://mailman.anu.edu.au/mailman/listinfo/link


------------------------------

End of Link Digest, Vol 387, Issue 8
************************************

Reply via email to