Wednesday, June 7, 2023
News 21 AV
  • Home
  • Tech News
    Ban predictive policing systems in EU AI Act, says civil society

    Insights on Nordic artificial intelligence strategies

    Unionised contract workers who train Google’s AI win pay rise

    Unionised contract workers who train Google’s AI win pay rise

    Government given until autumn 2023 to create technology roadmap to support net-zero strategy

    Government given until autumn 2023 to create technology roadmap to support net-zero strategy

    Ellison-founded sailing league SailGP plumps for Oracle NetSuite to expand

    Ellison-founded sailing league SailGP plumps for Oracle NetSuite to expand

    Cabinet Office looks to expand public data sharing for digital ID

    Cabinet Office looks to expand public data sharing for digital ID

    A pandemic retail trend that’s here to stay?

    LockBit cartel suspected of Royal Mail cyber attack

    Umbrella firm Parasol confirms ‘malicious activity’ as root cause of ongoing systems outage

    Government accused of leaving umbrella company regulation in limbo by shelving enforcement body

    UK government completes trials of age estimation technology

    UK government completes trials of age estimation technology

    Cyber insurance: The good, the bad and the ugly

    Companies warned to step up cyber security to become ‘insurable’

  • Virtual reality
    The other DWI: Driving while immersed

    The other DWI: Driving while immersed

    We tried out Canon's VR calling app Kokomo

    We tried out Canon’s VR calling app Kokomo

    Peacock subscribers can now stream content on Meta Quest devices

    Peacock subscribers can now stream content on Meta Quest devices

    A decade later, this VR treadmill is finally ready to ship

    A decade later, this VR treadmill is finally ready to ship

    How XR Technologies Are Making Design Reviews Immersive | NVIDIA Blog

    How XR Technologies Are Making Design Reviews Immersive | NVIDIA Blog

    Review: PlayStation VR2 is a huge leap that still can't escape its niche

    Review: PlayStation VR2 is a huge leap that still can’t escape its niche

    Meta Quest users can now tap and swipe in VR without controllers

    Meta Quest users can now tap and swipe in VR without controllers

    Former Salesforce exec Bret Taylor is teaming up with Google AR/VR vet Clay Bavor on mystery startup

    Former Salesforce exec Bret Taylor is teaming up with Google AR/VR vet Clay Bavor on mystery startup

    Google’s GV backs SideQuest, an unofficial Meta Quest app store

    Meta’s Reality Labs lost $13.7 billion on VR and AR last year

  • Lifestyle
    JUNTOSO 3 Pieces Recliner Sofa Sets

    How To Choose The Right Velvet Chesterfield Sofa For Your Living Room

    High-End Strollers

    Luxury Redefined: 6 Most Innovative Features in High-End Strollers

    Tips for Caregivers and Inter-abled Partners

    Top Tips for Choosing the Best Senior Living Facilities for You or Your Loved Ones

    Pros and Cons of No-Fault Insurance

    What are Medigap Plans? – Morning Lazziness

    Organizer1

    Organize Your Workspace With Industrial Storage Systems

    coffee

    Caffeine and Beyond: Natural Energy-Boosting Alternatives to Fight Fatigue

    How to Save Money as an Expat

    Staying out of Debt While Living With a Chronic Illness

    CapCut Online Editor

    Powerful Product Demos: Utilizing CapCut Online Editor for Your Business

    hair serum woman

    How To Use Redensyl Hair Growth Serum

  • Beauty
    Water Flosser

    This Bestselling Waterpik Is On Sale Right Now

    Proud To Be Pink Bobbi Brown Gloss Duo

    Proud To Be Pink Bobbi Brown Gloss Duo

    ColourPop x Snitchery Collection Swatches (Eyes & Cheeks)

    ColourPop x Snitchery Collection Swatches (Eyes & Cheeks)

    Image may contain Clothing Apparel Human Person Lingerie and Underwear

    Period Care Ads Are Woefully Lacking in Disability Representation

    mileys new years eve party

    Who Is Maxx Morando? – All About Miley Cyrus’s New Boyfriend

    Dior Cosmic Eyes (359) Eyeshadow Palette

    Dior Holiday 2022 Collection Swatches

    preview for How Emma Stone Became an Oscar-Winning Actress

    Who Is Dave McCary? Meet Emma Stone’s Husband and Baby Girl’s Dad

    Coloured Raine Sunset Chic Eyeshadow Palette Review & Swatches

    Coloured Raine Sunset Chic Eyeshadow Palette Review & Swatches

    Mila Kunis Criticizes Celebs Who Gave Will Smith a Standing Ovation at the Oscars After The Slap

    Mila Kunis Criticizes Celebs Who Gave Will Smith a Standing Ovation at the Oscars After The Slap

  • Health & Fitness
    2023 CrossFit North America West Semifinal Results — Alex Gazan, Patrick Vellner Notch Wins

    2023 CrossFit North America West Semifinal Results — Alex Gazan, Patrick Vellner Notch Wins

    Q&A With Ann Partridge, MD, MPH

    Are Psoriasis and Allergies Linked?

    Lucy Underdown Sets Kratos Bar Deadlift World Record of 305 Kilograms (672.4 Pounds)

    Lucy Underdown Sets Kratos Bar Deadlift World Record of 305 Kilograms (672.4 Pounds)

    Q&A With Ann Partridge, MD, MPH

    Can Statins Cause Brain Fog?

    The 10 Best Medicine Ball Exercises for Power, Conditioning, and More

    The 10 Best Medicine Ball Exercises for Power, Conditioning, and More

    WebMD: Better information. Better health.

    The Nuances of Treating Vitiligo in People of Color

    WebMD: Better information. Better health.

    Build a Care Team You Trust

    Hi-Tech Implant Helps Paralyzed Man Walk More Naturally

    Hi-Tech Implant Helps Paralyzed Man Walk More Naturally

    How to Do the Incline Dumbbell Bench Press for Upper Pec Muscle and Pressing Strength

    How to Do the Incline Dumbbell Bench Press for Upper Pec Muscle and Pressing Strength

  • Equipment
  • Login
No Result
View All Result
News 21 AV
Home Tech News

Businesses and governments urged to take action over Trojan Source supply chain attacks

News 21 AV by News 21 AV
November 2, 2021
in Tech News
0
Businesses and governments urged to take action over Trojan Source supply chain attacks
0
SHARES
0
VIEWS
FacebookTwitter

Related posts

Ban predictive policing systems in EU AI Act, says civil society

Insights on Nordic artificial intelligence strategies

January 14, 2023
Unionised contract workers who train Google’s AI win pay rise

Unionised contract workers who train Google’s AI win pay rise

January 14, 2023


Businesses and governments have been urged to take action to protect themselves against hacking attacks that are capable of injecting invisible backdoors into the source code of widely used programming languages.

Trojan Source attacks can be used by hackers or hostile states to launch powerful attacks against software supply chains by depositing doctored code in libraries and software repositories such as GitHub.

The hacking technique, disclosed today by researchers at the University of Cambridge, can be used by hostile attackers to insert backdoors into source code across almost all computer languages.

The attacks exploit standard control characters to secretly insert malicious code into source code which appears innocuous to humans reviewing it for potential security risks.

Nicholas Boucher and Ross Anderson of Cambridge University’s Computer Science Laboratory demonstrated that C, C++, JavaScript, Java, Rust, Go and Python are vulnerable to Trojan Source attacks.

They warned in a research paper published today (1 November) that the same attacks could be applied to almost any programming language that uses common software compilers that make use of Unicode – the international standard for encoding text and scripts.

The Cambridge researchers have spent the past three months coordinating a complex disclosure programme to allow suppliers of software tools, such as compilers, interpreters, code editors and code repositories, to put defences in place.

Half of the organisations contacted by the researchers during the disclosure process are either working on patches or have committed to doing so, but others, say the researchers, are “dragging their feet”.

Anderson said it was likely that bad actors will use the “Trojan Source trick” against some compilers that haven’t been patched to spread software vulnerabilities.

“We recommend that governments and firms that rely on critical software should identify their supplier’s posture, exert pressure on them to implement adequate defences and ensure that any gaps are covered by controls elsewhere in their toolchain,” the academics said.

“Any entity whose security relies on the integrity of software supply chains should be concerned,” they warned.

Copy and paste

Many developers are happy to copy and paste insecure source code from unofficial online sources. This makes it likely that attackers will post malicious code with invisible vulnerabilities in the hope that they will end up in production code.

There is a financial incentive for them to do so, the researchers argue, as there is a lucrative market for security vulnerabilities which can command seven-figure sums for the most valuable.

Malicious attackers have a strong incentive to use Trojan Source attacks to maliciously add backdoors into authenticated code that will persist in the wild for a long time.

Attacking open-source software components that are used by many other software applications would mean any attack will have “a large blast radius”.

The vulnerabilities would be difficult or impossible to detect by security specialists reviewing the uncompiled source code.

“Trojan Source attacks introduce the possibility of inserting such vulnerabilities into source code invisibly, thus completely circumventing the current principal control against them, namely human source code review,” the researchers said.

Supply chain attacks

Supply chain attacks have gained urgent attention from governments, including the US, which issued an executive order to improve the security of the software supply chain in May 2021.

In one of the largest supply chain attacks, FireEye disclosed in December 2020, nation-state hackers successfully attacked SolarWinds Orion, a widely used IT performance-monitoring platform, to attack governments and enterprises world-wide.

According to the University of Cambridge research, once published, supply chain vulnerabilities are likely to persist in the affected ecosystem even if patches are later released.

Bidi control characters

Trojan Source attacks exploit bi-directional control characters used in Unicode, which are used to swap between languages written left to right, such as English, and those written right to left, such as Arabic or Hebrew.

Attackers can use the control characters, known as Bidi override characters, to insert malicious code in source code that will appear unsuspicious to a human reviewer.

The malicious code can be hidden in comments or strings of characters in the source code of the programme. “Any developer who copies code from an untrusted source into a protected code base may inadvertently introduce an invisible vulnerability,” the researchers warn.

There is “an immediate” need for organisations to build defences into their code repositories and text editors used for writing code, the authors said.

One way to do this is to scan code for the presence of Bidi override characters.

The researchers found some evidence that techniques similar to Trojan Source attacks had been already exploited, although no malicious attacks have been discovered.

In the longer term, the use of Unicode attacks against Natural Language Systems will be a bigger problem, said Anderson.

Here, attackers could use Trojan Source type attacks disrupt for machine translation services, according to another paper published by University of Cambridge researchers.

That could disrupt the work of journalists or intelligence services monitoring events overseas, said Anderson.

“If journalists rely on machine translation to monitor hate speech by the Burmese army against the Rohingya, for example, then the army propagandists could use coding tricks to stop their stuff being translated, so it’s much less available to foreigners ,” said Anderson.

The same techniques could also be used to compromise business emails, to subvert search engine optimisation algorithms or to disable hate speech detection filters in social media services.



Source link

Tags: actionattacksBusinesseschaingovernmentssourcesupplyTrojanurged
Previous Post

Justices Seem Receptive to Bid to Stop Texas Abortion Law

Next Post

No cloud for Belfast City Airport in Nutanix hyper-converged switch

Next Post
No cloud for Belfast City Airport in Nutanix hyper-converged switch

No cloud for Belfast City Airport in Nutanix hyper-converged switch

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RECOMMENDED NEWS

CHANEL Chance Eau Tendre Scented Bath Tablets

CHANEL Chance Eau Tendre Scented Bath Tablets

12 months ago
10 Best Portable DVD Players for 2022

10 Best Portable DVD Players for 2022

1 year ago
Rhianon Lovelace Sets U64 Atlas Stone World Record of 146.8 Kilograms (324 Pounds)

Rhianon Lovelace Sets U64 Atlas Stone World Record of 146.8 Kilograms (324 Pounds)

4 months ago
Deck of Scarlet Solid Lip Oil New Shades

Deck of Scarlet Solid Lip Oil New Shades

1 year ago

BROWSE BY CATEGORIES

  • Beauty
  • Equipment
  • Health & Fitness
  • Lifestyle
  • Tech News
  • Virtual reality

BROWSE BY TOPICS

Beauty Equipment Health & Fitness Lifestyle Tech News Virtual reality

POPULAR NEWS

  • The 20 Best Leg Exercises for Size and Strength

    The 20 Best Leg Exercises for Size and Strength

    0 shares
    Share 0 Tweet 0
  • Who Is Dalton Gomez – Meet Ariana Grande’s Husband

    0 shares
    Share 0 Tweet 0
  • 14 Best Sanitary Napkins To Provide Comfort During Periods

    0 shares
    Share 0 Tweet 0
  • 10 Best CD Players in 2021

    0 shares
    Share 0 Tweet 0
  • Why Power Dressing is Important at Workplace For Women

    0 shares
    Share 0 Tweet 0
News 21 AV

We bring you the best of latest news articles with an emphasis. We offers an original take on the latest in Lifestyle, fashion, high tech and health & fitness informations and guides.

Follow us on social media:

Recent News

  • Your Risk of COVID-Linked Smell Loss Is Much Lower Now
  • 51 Mid-Century Modern Houses With Tips To Design And Decorate Yours
  • Strongman Leon Miroshnik Deadlifts 410 Kilograms (903.9 Pounds), Nearly 4 Times His Body Weight

Category

  • Beauty
  • Equipment
  • Health & Fitness
  • Lifestyle
  • Tech News
  • Virtual reality

Recent News

2023 CrossFit North America West Semifinal Results — Alex Gazan, Patrick Vellner Notch Wins

2023 CrossFit North America West Semifinal Results — Alex Gazan, Patrick Vellner Notch Wins

May 31, 2023
An Exercise in Repurposing and Design

An Exercise in Repurposing and Design

May 31, 2023
  • Blog
  • Privacy Policy
  • Disclaimer
  • Terms and Conditions
  • Contact us

© 2021 News.21av - Popular News & magazine powred by Get solutions.

No Result
View All Result
  • Home
  • Tech News
  • Virtual reality
  • Lifestyle
  • Beauty
  • Health & Fitness
  • Equipment

© 2021 News.21av - Popular News & magazine powred by Get solutions.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In