Search Results for “Matt Day”

August 22, 2019
Catalin Cimpanu / ZDNet

Catalin Cimpanu / ZDNet  
Security Researcher Reveals Second Zero-Day Bug in Steam Gaming Client After Being Banned by Company and HackerOne For Disclosing Earlier Zero-Day Flaw

Russian security researcher Vasily Kravets published details about a second zero-day vulnerability in the Steam gaming client after he was banned by Steam and Hacker One from Steam’s bug disclosure platform following Kravets’ public disclosure of another zero-day vulnerability in the platform earlier this summer. Although Valve issued a patch for the first bug, it proved to be insufficient.  Another security researcher Matt Nelson also revealed he found the same exact bug after Kravets which he too reported to Valve’s HackerOne program, only to go through a similar bad experience as Kravets. Nelson said both HackerOne and Valve took five days to acknowledge the bug, refused to patch it and locked the bug report when Nelson wanted to disclose the bug publicly and warn users. Kravets’ second Valve zero-day, which, like the first, is another EoP/LPE (escape of privilege or local privilege escalation) in the Steam client, allows malicious apps to gain admin rights through Valve’s Steam app. Part of Valve’s difficulty in dealing with this problem is that it appears to consider EoP/LPE vulnerabilities as “out-of-scope” for its HackerOne platform, meaning the company doesn’t view them as security issues despite the fact that most other companies do.

Related:, Slashdot, amonitoring, Hacker News (Ycombinator), THE INQUIRER, The Register, Security Affairs

Tweets:@mkolsek @viss @psidragon @enigma0x3 @MalwarePatrol Second Steam Zero-Day Impacts Over 96 Million Windows Users
Slashdot: Researcher Publishes Second Steam Zero Day After Getting Banned on Valve’s Bug Bounty Program
amonitoring: One more Steam Windows Client Local Privilege Escalation 0day
Hacker News (ycombinator): Researcher banned on Valve’s bug bounty program publishes second Steam 0-day (
THE INQUIRER: Researcher banned from Valve’s bug bounty exposes second Steam zero-day
The Register: Disgruntled bug-hunter drops Steam zero-day to get back at Valve for refusing him a bounty
Security Affairs: A new Zero-Day in Steam client impacts over 96 million Windows users

@mkolsek: Good news for Steam users: After several LPE 0days have been dropped, Valve changed their bug bounty scope to include local privilege escalation.
@viss: i am disappointed that valve does this kinda stuff
@psidragon: Valve banned me on their H1 program. So... I release new #ZeroDay #PublicDisclosure EoP vulnerability at Steam. Another #0day. Rus - Eng -
@enigma0x3: @steam_games that’s not really how that works. You can’t pick and choose what you define as a vulnerability. Your software is breaking the Windows security model.
@MalwarePatrol: Disgruntled bug-hunter drops Steam zero-day to get back at Valve for refusing him a bounty. via @TheRegister

August 9, 2019
Lawrence Abrams / Bleeping Computer

Lawrence Abrams / Bleeping Computer  
Security Researchers Discover, Publish Proof-of-Concept of Zero-Day Privilege Escalation Bug in Steam Game Client Posing Risk to 100 Million Users, Steam Doesn’t Commit to Fix

The popular Steam game client for Windows has a zero-day privilege escalation vulnerability that can allow an attacker with limited permissions to run a program as an administrator, posing a security threat to the client’s 100 million users, a security researcher known as Felix discovered. A second researcher named Matt Nelson published a proof of concept of the vulnerability and published it on GitHub. Valve chose not to issue a bug bounty payment or give an indication that they would fix it, and told the researchers that they were not allowed to disclose it.

October 10, 2019
Natalia Drozdiak, Giles Turner, and Matt Day / Bloomberg

Natalia Drozdiak, Giles Turner, and Matt Day / Bloomberg  
Dozens of Amazon Workers in India and Romania Watch Customer-Submitted Cloud Cam Clips Including Rare Instance of People Having Sex

Dozens of Amazon workers based in India and Romania review select clips captured by the company’s Cloud Cam home security camera, according to five people who have worked on the program or have direct knowledge of it. The clips are then used to train the AI algorithms to do a better job distinguishing between a real threat and a false alarm. The video clips are voluntarily selected by users, and employee testers, for troubleshooting, and some of the clips are sensitive videos, such as rare instances of people having sex. At times, employees have shared sensitive video clips with others. Amazon said users could delete their sensitive clips at any time by visiting the Manage My Content and Devices page.

Related: Fortune, Startups News | Tech News, AppleInsider, Techaeris, RT News, Mercury News, Tech Insider, GeekWire, Fortune, CNET, Mashable

Tweets:@PatrickMoorhead @mattmday

May 3, 2019
Matt Kapko / SDX Central

Matt Kapko / SDX Central  
Cisco Issues 40 Security Alerts, Warns of Critical Flaw in Nexus 9000 Series Software

Cisco issued the highest number of security advisories it has issued in a single day for at least a year, pushing out 40 security alerts including a critical one that affects the secure shell (SSH) key management for Cisco’s Nexus 9000 series Application Centric Infrastructure (ACI) mode switch software. That vulnerability “could allow an unauthenticated, remote attacker to connect to the affected system with the privileges of the root user,”  Cisco pins the vulnerability on the default SSH key pair that is present in all Cisco Nexus 9000 series devices. Cisco has issued a software update for this flaw and says there are no workarounds. (Posted updated to change the number of security alerts to 40.)

April 25, 2019
Matt Day , Giles Turner , and Natalia Drozdiak / Bloomberg

Matt Day , Giles Turner , and Natalia Drozdiak / Bloomberg  
Some Amazon Employees Who Listen to Alexa Voice Recordings Can Easily Find Users’ Home Addresses

An Amazon team that audits voice recordings picked up by Alexa has access to location data and in some cases can easily find users’ home addresses, according to five employees familiar with the program. The team members can access users’ geographic coordinates and type them into third-party mapping software to find home residences. Amazon collects the location data to better respond to users’ requests about nearby locations. Amazon said access is highly controlled and limited to a small number of employees processing a small number of transactions although two employees said that the vast majority of Amazon Data Services group employees could, until recently, access the data.

Related: The SunCCN, Android CentraliMore, TechnoBuffaloiPhone Hacks, MacRumors, AppleInsider, GizmodoMashable

April 11, 2019
Matt Day, Giles Turner, and Natalia Drozdiak / Bloomberg

Matt Day, Giles Turner, and Natalia Drozdiak / Bloomberg  
Amazon Employees Are Reportedly Listening to Users’ Alexa Voice Recordings to Improve Service

Amazon employs thousands of people around the world to help improve the Alexa digital assistant powering its line of Echo speakers who listen to voice recordings captured in Echo owners’ homes and offices which are transcribed, annotated and then fed back into the software, according to seven people who have worked on the program. The purpose of these reviews is to eliminate gaps in Alexa’s understanding of human speech and help it better respond to commands. The team who listen to the users’ Echo recordings comprises a mix of contractors and full-time Amazon employees who work in outposts from Boston to Costa Rica, India and Romania, with each reviewer parsing as many as 1,000 audio clips per nine-hour shift. The workers say they sometimes hear recordings they find upsetting, or possibly criminal and two workers say their Amazon supervisors say it’s Amazon’s job to not interfere. Even users’ who have opted out of having their voice recordings used for the development of new features have their recordings sent for these reviews.

Related: Ars Technica, Android Central , Pocket-lint, Tech Insider, MacRumors, ZDNet Security, Zero Hedge, iPhone Hacks, Slashdot, The Inquisitr News

April 14, 2017
Joseph Cox / Motherboard

Joseph Cox / Motherboard  
Shadow Brokers Dump Another, Likely More Serious Cache of NSA Hacking Tools

The mysterious group known as the Shadow Brokers dumped another set of what are believed to be NSA hacking tools, this time with files of what appear to be zero-day exploits of older Windows operating systems. The group, widely considered to be a Russian state front, also released files and presentations related to the collection of data from banking systems. According to security architect Kevin Beaumont, the Windows implants are new to VirusTotal, meaning they’ve never been seen before. The banking system files, labeled JEEPFLEA_MARKET, deal with the SWIFT Alliance Access (SAA) systems, used by banks around the world for monetary transactions. Jeepflea is reported to be a hacking project from the NSA’s elite Tailored Access Operations (TAO) unit. Security experts are combing through the files for further analysis, but on first blush this dump, which follows an earlier dump by the Shadow Brokers last week, appears to contain the most serious exploits and damaging information of any materials released by Shadow Brokers so far. UPDATE: Microsoft issued a statement saying that the vulnerabilities exploited by these attacks were patched for all supported Windows Systems in the company’s March security update.

Related: Bleeping Computer, Shadow BrokersThe Verge, emptywheel, Matt Suiche on Medium, LawfareThe Seattle Times, TechCrunch, WIREDZDNet, WinBuzzer, The Hacker News, Ars Technica