Skip to content

Airvers Tech News

Focus on science and technology.

Primary Menu
  • Home
  • Technology
  • Science
  • Movie
  • Music
  • Game
  • Comic
  • Anecdote
  • Software
  • Receive SMS
  • Home
  • Technology
  • The proof of concept breaks the unbreakable promise of the Mega cloud disk, but the official is only willing to fool the repair
  • Technology

The proof of concept breaks the unbreakable promise of the Mega cloud disk, but the official is only willing to fool the repair

Andrew 06/22/2022 2 min read

(viaARS Technica)

Embarrassingly, an item published on Tuesdayresearch showsIn fact, the infrastructure entities managed by Mega cannot fully guarantee the security of users’ stored data.

The authors point out that the file encryption mechanism used by Mega is full of low-level cryptographic flaws, making it easy for someone with ulterior motives to perform a full key recovery attack after a user has logged in enough times.

If successful, the attacker can decipher the user’s stored files and even upload other malicious files to the user’s repository – even if it appears to be indistinguishable from the actual uploaded data.

Researchers write – We have demonstrated that Mega’s system is incapable of protecting its users from malicious servers, and propose five different attack vectors, all of which can wreak havoc on the confidentiality of user files.

We build proof-of-concepts of all attacks and demonstrate real-world exploitability. In addition, the integrity of user data is at risk, and attackers can plant malware of their choice at will, bypassing all authenticity checks on the client side.

Even after receiving private reports from researchers in March, an update that Mega began pushing on Tuesday could only be considered a temporary solution to make the attack more difficult to execute.

The researchers cautioned that the patch did not address key reuse, lack of integrity checks, and other systemic issues previously identified. They wrote in an email:

This means that these vulnerabilities can still be exploited if the prerequisites for other attacks are met in some different way.

Because of this, we do not endorse the patch even though the system is no longer affected by the exact attack chain proposed earlier.

RSA Key Recovery Attack(via)

The problem is that Mega’s security hierarchy lacks any means of ensuring key integrity, causing servers not to reject an invalid key but to continue interacting with one, making the platform vulnerable to key recovery attacks .

Using brute force, an attacker could recover the RSA private key after 1023 client logins. But using dichotomy + lattice cryptanalysis reduces the number of attempts required for the attack to 512 – as shown in the mega-awry.io proof-of-concept.

Regrettably, Mega chairman Stephen Hall denies that it has lost the promise it made to users a decade ago. The rationale is that the vulnerability would only allow malicious actors to succeed if an active user logged in more than 512 times, but this is fairly rare.

As for whether the follow-up Mega will refer to the medium and long-term repair plan given by the researchers, it remains to be tested by time.

Related

Continue Reading

Previous: Tim Cook invites outsiders to ‘look forward’ to how Apple will develop AR in interview
Next: Registry trick to show if PC is ready for Windows 11 22H2 (Sun Valley 2)

Read More

Yu Chengdong publicly thanked Li Xiang: Range extension is the most suitable new energy vehicle model at present
1 min read
  • Technology

Yu Chengdong publicly thanked Li Xiang: Range extension is the most suitable new energy vehicle model at present

07/06/2022
Canada to discard 13.6 million doses of expired AstraZeneca vaccine
1 min read
  • Technology

Canada to discard 13.6 million doses of expired AstraZeneca vaccine

07/06/2022
What can Disney’s strongest legal department do to stop “Mickey Mouse’s freedom”?
9 min read
  • Technology

What can Disney’s strongest legal department do to stop “Mickey Mouse’s freedom”?

07/06/2022

Archives

  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • “Jelly Bean” players exceeded 50 million players for only two weeks07/06/2022
  • Yu Chengdong publicly thanked Li Xiang: Range extension is the most suitable new energy vehicle model at present07/06/2022
  • Canada to discard 13.6 million doses of expired AstraZeneca vaccine07/06/2022
  • Ubisoft announces first trailer for mobile game The Division: Dawn07/06/2022
  • How did “The Lonely Brave” change from an Internet Divine Comedy to a National Children’s Song?07/06/2022

Newest

“Jelly Bean” players exceeded 50 million players for only two weeks
1 min read
  • Game

“Jelly Bean” players exceeded 50 million players for only two weeks

07/06/2022
Yu Chengdong publicly thanked Li Xiang: Range extension is the most suitable new energy vehicle model at present
1 min read
  • Technology

Yu Chengdong publicly thanked Li Xiang: Range extension is the most suitable new energy vehicle model at present

07/06/2022
Canada to discard 13.6 million doses of expired AstraZeneca vaccine
1 min read
  • Technology

Canada to discard 13.6 million doses of expired AstraZeneca vaccine

07/06/2022
Ubisoft announces first trailer for mobile game The Division: Dawn
1 min read
  • Game

Ubisoft announces first trailer for mobile game The Division: Dawn

07/06/2022
  • Home
  • Technology
  • Science
  • Movie
  • Music
  • Game
  • Comic
  • Anecdote
  • Software
  • Receive SMS
Copyright © All rights reserved.