Library

Video Player is loading.
 
Current Time 0:00
Duration 7:57
Loaded: 0.00%
 

x1.00


Back

Games & Quizzes

Training Mode - Typing
Fill the gaps to the Lyric - Best method
Training Mode - Picking
Pick the correct word to fill in the gap
Fill In The Blank
Find the missing words in a sentence Requires 5 vocabulary annotations
Vocabulary Match
Match the words to the definitions Requires 10 vocabulary annotations

You may need to watch a part of the video to unlock quizzes

Don't forget to Sign In to save your points

Challenge Accomplished

PERFECT HITS +NaN
HITS +NaN
LONGEST STREAK +NaN
TOTAL +
- //

We couldn't find definitions for the word you were looking for.
Or maybe the current language is not supported

  • 00:00

    Zyxel has an actively exploited vulnerability so patch now, a shut down iphone could be
    Zyxel has an actively exploited vulnerability so patch now, a shut down iphone could be

  • 00:05

    hacked, and a SatComms hack is being blamed on Russia!
    hacked, and a SatComms hack is being blamed on Russia!

  • 00:09

    All that coming up now on ThreatWire.
    All that coming up now on ThreatWire.

  • 00:12

    Greetings!!
    Greetings!!

  • 00:14

    I’m Shannon Morse and this is ThreatWire for May 17 2022 - this is your summary of
    I’m Shannon Morse and this is ThreatWire for May 17 2022 - this is your summary of

  • 00:21

    the threats to our security, privacy and Internet freedom.
    the threats to our security, privacy and Internet freedom.

  • 00:25

    Announcement!
    Announcement!

  • 00:27

    I have a new Patreon perk to share with y’all.
    I have a new Patreon perk to share with y’all.

  • 00:32

    For years I’ve always done 3 stories for free on youtube, and now I’m adding additional
    For years I’ve always done 3 stories for free on youtube, and now I’m adding additional

  • 00:39

    work to my weekly effort to bring you the news and in order to pay for my time, I’m
    work to my weekly effort to bring you the news and in order to pay for my time, I’m

  • 00:44

    including a fourth story as a new perk just for Patrons.
    including a fourth story as a new perk just for Patrons.

  • 00:47

    I appreciate everyone who helps make this show possible because it continues to be ad
    I appreciate everyone who helps make this show possible because it continues to be ad

  • 00:52

    free, we even turn off monetization on youtube, so this is literally the only way this show
    free, we even turn off monetization on youtube, so this is literally the only way this show

  • 00:58

    is funded.
    is funded.

  • 00:59

    So thank you for the support, let’s get started with today’s news.
    So thank you for the support, let’s get started with today’s news.

  • 01:04

    If you own Zyxel networking equipment, a recent vulnerability in their firewall products has
    If you own Zyxel networking equipment, a recent vulnerability in their firewall products has

  • 01:16

    been patched and updating is recommended.
    been patched and updating is recommended.

  • 01:19

    This is a critical vulnerability tracked as CVE 2022-30525, and was originally disclosed
    This is a critical vulnerability tracked as CVE 2022-30525, and was originally disclosed

  • 01:27

    by Rapid7 on April 13 of this year.
    by Rapid7 on April 13 of this year.

  • 01:31

    Zyxel had pushed a silent update out two weeks ago but have now publicly disclosed the vulnerability.
    Zyxel had pushed a silent update out two weeks ago but have now publicly disclosed the vulnerability.

  • 01:37

    In this case, the issue affects several models of networking equipment including the USG
    In this case, the issue affects several models of networking equipment including the USG

  • 01:44

    Flex line, USG, and APT lines with firmware 5.21 or below.
    Flex line, USG, and APT lines with firmware 5.21 or below.

  • 01:51

    The specific products it affects are ones that use firewalls that support Zero Touch
    The specific products it affects are ones that use firewalls that support Zero Touch

  • 01:55

    Provisioning or ZTP.
    Provisioning or ZTP.

  • 01:58

    The affected firmware is ZLD5.00 up through ZLD 5.21 Patch1.
    The affected firmware is ZLD5.00 up through ZLD 5.21 Patch1.

  • 02:07

    Companies use these across the world, with Rapid7 reporting that they’d found 15000
    Companies use these across the world, with Rapid7 reporting that they’d found 15000

  • 02:13

    visible and affected models on Shodan.
    visible and affected models on Shodan.

  • 02:16

    Weirdly, according to their report, Zyxel originally planned to release a patch for
    Weirdly, according to their report, Zyxel originally planned to release a patch for

  • 02:21

    the flaw on June 14, but silently released one ahead of schedule without indicating such
    the flaw on June 14, but silently released one ahead of schedule without indicating such

  • 02:27

    to Rapid7.
    to Rapid7.

  • 02:28

    Rapid7 found out a patch was released, so they publicly disclosed the flaw on May 12.
    Rapid7 found out a patch was released, so they publicly disclosed the flaw on May 12.

  • 02:35

    Zyxel has noted this was because of a miscommunication during the disclosure coordination process.
    Zyxel has noted this was because of a miscommunication during the disclosure coordination process.

  • 02:42

    A Metasploit module as well as a demonstration video are available online and linked in my
    A Metasploit module as well as a demonstration video are available online and linked in my

  • 02:50

    shownotes via Patreon.
    shownotes via Patreon.

  • 02:52

    Since many of these products are usually used in small businesses or corporate networks
    Since many of these products are usually used in small businesses or corporate networks

  • 02:57

    to give employees access to VPNs, email security, SSL inspection, protection against intrusions
    to give employees access to VPNs, email security, SSL inspection, protection against intrusions

  • 03:04

    etc, that means an attacker could gain access to proprietary networks should a product go
    etc, that means an attacker could gain access to proprietary networks should a product go

  • 03:11

    unpatched.
    unpatched.

  • 03:12

    This flaw allows an attacker to gain full access to devices and networks, as it’s
    This flaw allows an attacker to gain full access to devices and networks, as it’s

  • 03:16

    an unauthenticated remote command injection flaw through the HTTP interface.
    an unauthenticated remote command injection flaw through the HTTP interface.

  • 03:22

    Input is passed through unsanitized, allowing an attacker to inject arbitrary commands.
    Input is passed through unsanitized, allowing an attacker to inject arbitrary commands.

  • 03:28

    Last week on Friday, Shadowserver Foundation noticed active attempts to exploit the vulnerability,
    Last week on Friday, Shadowserver Foundation noticed active attempts to exploit the vulnerability,

  • 03:35

    and security researchers have responded by creating scripts that can detect unauthenticated
    and security researchers have responded by creating scripts that can detect unauthenticated

  • 03:40

    remote command injections on Zyxel firewalls and VPN products, like this one from BlueNinja.
    remote command injections on Zyxel firewalls and VPN products, like this one from BlueNinja.

  • 03:47

    If you can’t update to the latest patch, mitigation also includes disabling WAN access
    If you can’t update to the latest patch, mitigation also includes disabling WAN access

  • 03:53

    to the admin web interface.
    to the admin web interface.

  • 03:54

    A brand new attack surface has been found in iOS’s Find My service, which could allow
    A brand new attack surface has been found in iOS’s Find My service, which could allow

  • 04:01

    an attacker to mess with firmware and load malware onto an iPhone’s Bluetooth chipset…
    an attacker to mess with firmware and load malware onto an iPhone’s Bluetooth chipset…

  • 04:07

    while the iPhone is set to OFF.
    while the iPhone is set to OFF.

  • 04:10

    Yes, you heard that right.
    Yes, you heard that right.

  • 04:12

    Bluetooth and other communications chipsets like NFC and UWB or ultrawideband still operate
    Bluetooth and other communications chipsets like NFC and UWB or ultrawideband still operate

  • 04:19

    when the phone is turned off, in a mode called Low Power Mode, which preserves power but
    when the phone is turned off, in a mode called Low Power Mode, which preserves power but

  • 04:25

    still lets things like Find My and Express Card transactions work.
    still lets things like Find My and Express Card transactions work.

  • 04:30

    The drawback is these chips also have access to a secure element or SE, since, according
    The drawback is these chips also have access to a secure element or SE, since, according

  • 04:37

    to researchers with the Secure Mobile Networking Lab at the Technical University of Darmstadt,
    to researchers with the Secure Mobile Networking Lab at the Technical University of Darmstadt,

  • 04:43

    the Bluetooth and UWB chips are hardwired right into the SE on the NFC chip.
    the Bluetooth and UWB chips are hardwired right into the SE on the NFC chip.

  • 04:50

    As such, wireless protocols aren’t shut down completely when your phone is turned
    As such, wireless protocols aren’t shut down completely when your phone is turned

  • 04:54

    off and could be used as an attack surface.
    off and could be used as an attack surface.

  • 04:58

    Devices that are affected include the iPhone 11, 12, and 13, all of which have UWB support.
    Devices that are affected include the iPhone 11, 12, and 13, all of which have UWB support.

  • 05:04

    Bluetooth firmware isn’t signed or encrypted and this issue could be used to infect the
    Bluetooth firmware isn’t signed or encrypted and this issue could be used to infect the

  • 05:09

    chip with malware if an attacker had elevated access.
    chip with malware if an attacker had elevated access.

  • 05:12

    They’d have to be able to access the OS and modify the firmware or do code execution
    They’d have to be able to access the OS and modify the firmware or do code execution

  • 05:19

    over the air.
    over the air.

  • 05:20

    The researchers who discovered this novel issue will present it at WiSec 2022.
    The researchers who discovered this novel issue will present it at WiSec 2022.

  • 05:28

    While the problem has been disclosed to Apple, Apple didn’t respond with any remediation
    While the problem has been disclosed to Apple, Apple didn’t respond with any remediation

  • 05:33

    or mitigation techniques.
    or mitigation techniques.

  • 05:34

    Software or firmware updates wouldn’t fix it since this is a hardware issue.
    Software or firmware updates wouldn’t fix it since this is a hardware issue.

  • 05:42

    Big shoutout to my Hush Puppy perk level patrons for sharing their fur baby or feather baby
    Big shoutout to my Hush Puppy perk level patrons for sharing their fur baby or feather baby

  • 05:47

    photos and for the support.
    photos and for the support.

  • 05:50

    THANK YOU to KnowOneSpecial and Wayward Viking for joining the alliance on Patreon.com/threatwire.
    THANK YOU to KnowOneSpecial and Wayward Viking for joining the alliance on Patreon.com/threatwire.

  • 05:56

    Y’all helped us hit 810 Patreon Alliance members all of whom get access to a fourth
    Y’all helped us hit 810 Patreon Alliance members all of whom get access to a fourth

  • 06:04

    story, check that out if you’re interested.
    story, check that out if you’re interested.

  • 06:07

    Let’s finish out today’s episode with my last top story, about a major Satellite
    Let’s finish out today’s episode with my last top story, about a major Satellite

  • 06:13

    hack that happened a few months ago and was mentioned previously on an episode of threatwire.
    hack that happened a few months ago and was mentioned previously on an episode of threatwire.

  • 06:19

    The Five Eyes countries have formally blamed Russia for being behind a cyberattack on a
    The Five Eyes countries have formally blamed Russia for being behind a cyberattack on a

  • 06:25

    satellite communications provider directly before the military invasion of Ukraine.
    satellite communications provider directly before the military invasion of Ukraine.

  • 06:31

    The attack happened on February 24, one hour before the invasion occurred, and it took
    The attack happened on February 24, one hour before the invasion occurred, and it took

  • 06:37

    down operations of the KA-SAT satellite network which is operating by Viasat.
    down operations of the KA-SAT satellite network which is operating by Viasat.

  • 06:42

    This not only affected Ukraine, but also several European countries by affecting wind farms
    This not only affected Ukraine, but also several European countries by affecting wind farms

  • 06:48

    and internet operations.
    and internet operations.

  • 06:50

    There were communications outages for several countries, not only for users but for public
    There were communications outages for several countries, not only for users but for public

  • 06:55

    authorities and businesses.
    authorities and businesses.

  • 06:58

    Viasat ended up sending out 30,000 modems to customers in order to get them back online
    Viasat ended up sending out 30,000 modems to customers in order to get them back online

  • 07:03

    after their modems were hit.
    after their modems were hit.

  • 07:06

    The countries who formally blamed Russia include Australia, Canada, New Zealand, the UK and
    The countries who formally blamed Russia include Australia, Canada, New Zealand, the UK and

  • 07:12

    the US plus Ukraine and the EU.
    the US plus Ukraine and the EU.

  • 07:15

    According to SentinelOne, the attackers used AcidRain data wiping malware with the intention
    According to SentinelOne, the attackers used AcidRain data wiping malware with the intention

  • 07:21

    of infecting modems with the wiper plus a botnet called VPNFilter, which has been attributed
    of infecting modems with the wiper plus a botnet called VPNFilter, which has been attributed

  • 07:27

    to the Russian cyber group Sandworm.
    to the Russian cyber group Sandworm.

  • 07:30

    Want to see more tech videos from me?
    Want to see more tech videos from me?

  • 07:32

    Check out my youtube channel - youtube.com/ShannonMorse for everything from tech reviews to security
    Check out my youtube channel - youtube.com/ShannonMorse for everything from tech reviews to security

  • 07:38

    tutorials..
    tutorials..

  • 07:39

    And with that, don't forget to like and subscribe to Hak5!
    And with that, don't forget to like and subscribe to Hak5!

  • 07:43

    I'm Shannon Morse, I'll see you on the Internet!
    I'm Shannon Morse, I'll see you on the Internet!

All phrase
shut down
//

phrase

cease business or operation.

Hacking Shut Down iPhones - ThreatWire

40,153 views

Video Language:

  • English

Caption Language:

  • English (en)

Accent:

  • English (US)

Speech Time:

99%
  • 7:54 / 7:57

Speech Rate:

  • 133 wpm - Conversational

Category:

  • Science & Technology

Intro:

Zyxel has an actively exploited vulnerability so patch now, a shut down iphone could be
hacked, and a SatComms hack is being blamed on Russia!
All that coming up now on ThreatWire.. Greetings!!. I’m Shannon Morse and this is ThreatWire for May 17 2022 - this is your summary of
the threats to our security, privacy and Internet freedom.
Announcement!. I have a new Patreon perk to share with y’all.. For years I’ve always done 3 stories for free on youtube, and now I’m adding additional
work to my weekly effort to bring you the news and in order to pay for my time, I’m
including a fourth story as a new perk just for Patrons.
I appreciate everyone who helps make this show possible because it continues to be ad
free, we even turn off monetization on youtube, so this is literally the only way this show
is funded.. So thank you for the support, let’s get started with today’s news.
If you own Zyxel networking equipment, a recent vulnerability in their firewall products has
been patched and updating is recommended.. This is a critical vulnerability tracked as CVE 2022-30525, and was originally disclosed
by Rapid7 on April 13 of this year.. Zyxel had pushed a silent update out two weeks ago but have now publicly disclosed the vulnerability.

Video Vocabulary

/ˌmänədəˈzāSH(ə)n/

noun

action of earning revenue from asset, etc..

/THret/

noun other

statement of intention to inflict pain, injury, damage, or other hostile action on someone in retribution for something. Warnings that you may be harmed.

/spəˈsifik/

adjective noun

Concerning one particular thing or kind of thing. medicine or remedy effective in treating particular disease.

/bēˈkəz/

conjunction

for reason that.

noun

Being weak and able to be easily hurt or damaged.

verb

To selfishly take advantage of or treat badly.

/ˈfərmwer/

noun

Coded instructions stored permanently in memory.

/əˈrij(ə)nəlē/

adverb

from or in beginning.

/əˈfekt/

verb

To cause a change in something else.

/ˈlidərəlē/

adverb

So as to express the exact meaning of something.

/paCH/

adjective verb

Mended by covering a hole with a patch. To repair hole by sewing a piece of cloth over it.

/ˈsev(ə)rəl/

adjective determiner pronoun

Many of. more than two but not many. More than two but not a large amount.

/ˈpəblik(ə)lē/

adverb

so as to be seen by other people.