Monday, December 30, 2019

Turbines, Simens, Vulnerabilities, Power

New release by Kaspersky team leaded by SCADA StrangeLove fellow Gleb Gritsai  "On the insecure nature of turbine control systems in power generation" as presented on Chaos Communication Congress 36C3.

Power plants everywhere...

Friday, December 6, 2019

Artificial Intelligence Security Census

In this paper, we present the results of Internet-wide security scans of publicly available AIML systems. We show that many different interfaces of AIML systems are not protected and accessible from the Internet, moreover, most of them don't even have basic security mechanisms. Also, we describe found the known vulnerabilities related to outdated software and insecure configurations. 

Thursday, November 14, 2019

Malign Machine Learning Models and bad DICOM

Zeronighs 2019 AISec releases: how to insert malware into TensorFlow and PyTorch models and hack NVIDIA Clara ML pipeline with DICOM image.


Thursday, October 24, 2019

AISec on ZeroNights 2019

New AISec releases soon at Zeronights 2019.

Roman Palkin : "Malign Machine Learning Models"
Maria Nedyak : "Hacking Medical Imaging with DICOM"


See you there!

Slides and videos

Wednesday, October 16, 2019

Cyber Resilience of Railway Signaling Systems

Recently published information on the cybersecurity assessment of railway computer and communication-based control systems (CBCS) identified several weaknesses and vulnerabilities, which allow threat agents to not only degrade system reliability and bypass safety mechanisms, but to carry out attacks which directly affect the rail traffic safety. Despite these findings, remarkably these systems meet all relevant IT security and functional safety requirements and have the required international, national and industrial certificates.

Monday, October 14, 2019

HITB AISec slides and special release

Slides "AI for Security and Security for AI" talk by Sergey Gordeychik, as presented at HITB CyberWeek 2019, Abu Dhabi.



Machine learning technologies are turning from rocket science into daily engineering life. You no longer have to know the difference between Faster R-CNN and HMM to develop a machine vision system, and even OpenCV has bindings for JavaScript allowing to resolve quite serious tasks all the while remaining in front end. On other hand massive implementation of AI in various areas brings about problems, and security is one of the greatest concerns. In the broader context security is really all about trust.

Do we trust AI? I don’t, personally.

Thursday, October 10, 2019

DICOM to passwd. On security of ML pipelines

Machine Learning and Artificial Intelligence Pipelines are very useful tools. They help to concentrate on specific task without digging into implementation details. However, from design and security perspective these things are like Frankenstein.

Here is  an example


Sunday, September 29, 2019

Wednesday, September 11, 2019

Silverpeak SD-WAN +7 CVE

Fixed (?) published. Kudos SD-WAN New Hop team: Sergey Gordeychick, Denis Kolegov, Maxim Gorbunov, Nikolay Tkachenko, Nikita Oleksov, Oleg Broslavsky, Antony Nikolaev

Friday, August 23, 2019

AI Finger

Special release for XCON 2019 Beijing conference and “AI for Security or Security for AI” talk by Sergey Gordeychik.

Very first (and very draft) round of Machine Learning and Artificial Intelligence Frameworks and Applications Fingerprinting and Internet Census project.
Based on the Grinder framework.



Monday, July 1, 2019

SD-WAN Security Assessment: The First Hours

SD-WAN Security Assessment: The First Hours


Introduction


Suppose you need to perform a security assessment of an SD-WAN solution.
There are several reasons for this and one of them is selecting an SD-WAN provider or product.

A traditional SD-WAN system involves many planes, technologies, mechanisms, services, protocols and features.
It has distributed and multilayered architecture. So where should you start?

The main goal of this document is to list basic sanity checks that can be used when investigating SD-WAN.
We will consider general checks that can be applied to any SD-WAN system.

Wednesday, May 15, 2019

More cyber girls needed!

Harbour.Space University (Barcelona) provides  scholarship opportunity for women who want to study Cybersecurity or Fintech.
Apply before May 30th to Hack The Planet for free!

https://harbour.space/register

Sunday, May 12, 2019

On CVE-2019-11550


Citrix SD-WAN Security Update (CTX247735)

An information disclosure vulnerability has been identified in the Citrix SD-WAN Appliance. This  vulnerability could allow an unauthenticated attacker to perform a man-in-the-middle attack against management traffic.

Tuesday, April 30, 2019

The Grinder updates

New release of the Grinder framework, created to automatically enumerate and fingerprint hosts on the Internet using different back-end systems: search engines, such as Shodan or Censys, for discovering hosts and NMAP engine for fingerprinting and specific checks.


Wednesday, March 27, 2019

The Grinder for SD-WAN

Internet-connected Devices Census Python Framework by Anton Nikolaev

Special release for insomnihack 2019.

The Grinder framework was created to automatically enumerate and fingerprint different hosts on the Internet using different back-end systems: search engines, such as Shodan or Censys, for discovering hosts and NMAP engine for fingerprinting and specific checks. The Grinder framework can be used in many different areas of researches, as a connected Python module in your own project or as an independent ready-to-use from the box tool.