this post was submitted on 12 Aug 2024
512 points (95.9% liked)

Selfhosted

40152 readers
478 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

Here we are - 3600 which was still under manufacture 2-3 years ago are not get patched. Shame on you AMD, if it is true.

you are viewing a single comment's thread
view the rest of the comments
[–] Kolanaki@yiffit.net 31 points 3 months ago (26 children)

How severe is this vulnerability?

[–] ducking_donuts@lemm.ee 65 points 3 months ago (18 children)

The good news is that in order to exploit the new vulnerability, the attacker first has to obtain kernel level access to the system somehow - by exploiting some other vulnerabilities perhaps.

The bad news is once Sinkclose attack is performed, it can be hard to detect and mitigate: it can even survive an OS reinstall.

[–] scoutFDT@lemm.ee 54 points 3 months ago (2 children)

So basically what you are saying is we just need one pvp game with kernel level anti cheat to fuck up somewhere...... yeah I'm sure that's not going to happen.

[–] Appoxo@lemmy.dbzer0.com 12 points 3 months ago (3 children)

Probably only on a targeted attack. I don't see it being a mass target attack like a worm could be.
And in the realm of businesses, how many programs are running in kernel level besides the antivirus/ED(P)R solution?

[–] weker01@sh.itjust.works 12 points 3 months ago

And with crowd strike we have seen how reliable Antivirus is.

[–] conciselyverbose@sh.itjust.works 4 points 3 months ago (1 children)

I don't see it being a mass target attack like a worm could be.

Why not? Malware that survives a full new install is extremely valuable, and there are loads of games adding vulnerabilities with required kernel level rootkits. It's only a matter of time until one of these vendors is exploited, and why wouldn't you permanently own the significant chunk of the market with unpatched serious vulnerabilities while you're at it?

[–] Appoxo@lemmy.dbzer0.com 1 points 3 months ago (1 children)

Again: Mass spread vs target attack.
Remember WannaCry? Yeah, I don't see that happen.
But (industrial) e-spionage on the other hand? Yup. Will happen 100%

[–] conciselyverbose@sh.itjust.works 1 points 3 months ago (1 children)

For what reason?

Kernel level game anticheats are a great attack vector, and it's one that inherently identifies and enables distribution to other vulnerable targets. It's begging to self replicate.

Industrial espionage does not make sense, because most enterprises have, even if imperfect, restrictions on what can be installed on company computers that contain valuable information. You're not going to get a game with kernel malware on a managed enterprise computer.

[–] Appoxo@lemmy.dbzer0.com 2 points 3 months ago* (last edited 3 months ago) (1 children)

Are you ignoring what I wrote earlier in the same thread?

Probably only on a targeted attack. I don't see it being a mass target attack like a worm could be. And in the realm of businesses, how many programs are running in kernel level besides the antivirus/ED(P)R solution?

Anyway. Counter question: Why do you think gamers appear as a more valuable target with the anti cheat as a possible attack vector vs a business running literally the same CPU line-up but with fewer kernel level programs?

My personal opinion: You can't extract as much money from private folks vs a business through blackmail and other solutions. Not in a wide casted attack.
Targeted individuals can be assumed to be at a higher risk (e.g. hacking their private devices like the gaming pc and then doing home office work in the same network, or misusing trust in the home network between pc and phone and then installing malware like pegasus).
But again: Not in a wide casted net. And you are probably better of using the good exploits for higher value targets.

[–] conciselyverbose@sh.itjust.works 2 points 3 months ago

You're responding to a post about exploiting kernel level anticheat and saying it would only be a targeted attack, despite that inherently not making sense. When you find a vulnerability in that software, there is absolutely no reason not to spread it en masse. The cost to infect one person is the same as the cost to affect tens of thousands or more. The game is both the vulnerability and the distribution method.

Gamers aren't more valuable. They're more accessible. Because there isn't a kernel rootkit "anticheat" developer on the planet who gives two shits about security in any context, and there are a massive number of systems that their insane hacky bullshit touches. Every single one of them has their security automatically compromised. The goal isn't just information. You're getting a massive, distributed, residential IP botnet that you can't lose unless they throw their systems in the trash.

[–] possiblylinux127@lemmy.zip 1 points 3 months ago

The USB and network stack

load more comments (15 replies)
load more comments (22 replies)