Lucene search

K
taosecurityRichard Bejtlich ([email protected])TAOSECURITY:37F5AF86E0886FC0FBDCCE15A1236586
HistoryJan 22, 2018 - 2:28 p.m.

Lies and More Lies

2018-01-2214:28:00
Richard Bejtlich ([email protected])
taosecurity.blogspot.com
162

0.976 High

EPSS

Percentile

100.0%

Following the release of the Spectre and Meltdown CPU attacks, the security community wondered if other researchers would find related speculative attack problems. When the following appeared, we were concerned:

"Skyfall and Solace
_
_More vulnerabilities in modern computers.
_
__Following the recent release of the Meltdown and Spectre vulnerabilities, CVE-2017-5175, CVE-2017-5753 and CVE-2017-5754, there has been considerable speculation as to whether all the issues described can be fully mitigated. _
_
_Skyfall and Solace are two speculative attacks based on the work highlighted by Meltdown and Spectre.
_
_Full details are still under embargo and will be published soon when chip manufacturers and Operating System vendors have prepared patches.
_
_Watch this space…"

It turns out this was a hoax. The latest version of the site says, in part:

"With little more than a couple of quickly registered domain names, thousands of people were hooked…
_
_Skyfall
_
_The idea here was to suggest a link to Intel’s Skylake processor.
_
_Solace
_
_The idea here was to suggest a link to the Solaris operating system.
_
_Copy the styling of the original Meltdown and Spectre sites and add a couple of favicons based loosely on the Intel and Solaris logos and I was nearly done.
_
_The final step was to add on https, because if a site’s got an SSL certificate it must be legitimate, and the bait was set."

The problem with this “explanation” is that it wasn’t just a logo, domain name and SSL certificate. The “security professional” who created this site outright lied, as shown at the top of this post. Don’t fall for his false narrative.

I’m not naming names or linking to the sites here, because the person responsible already thinks he’s too clever.

Copyright 2003-2018 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)