{"id":623940,"date":"2023-03-31T09:49:25","date_gmt":"2023-03-31T14:49:25","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/03\/31\/this-bing-flaw-let-hackers-change-search-results-and-steal-your-files\/"},"modified":"2023-03-31T09:49:25","modified_gmt":"2023-03-31T14:49:25","slug":"this-bing-flaw-let-hackers-change-search-results-and-steal-your-files","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/03\/31\/this-bing-flaw-let-hackers-change-search-results-and-steal-your-files\/","title":{"rendered":"This Bing flaw let hackers change search results and steal your files"},"content":{"rendered":"<div id=\"h-maincontent\" data-post-id=\"3312869\" data-post-url=\"https:\/\/www.digitaltrends.com\/computing\/bing-exploit-change-search-results-steal-files\/\">\n<header id=\"dt-post-title\">\n<p><cite><\/p>\n<div>\n<p><img decoding=\"async\" src=\"https:\/\/www.digitaltrends.com\/wp-content\/uploads\/wp-content\/uploads\/2021\/11\/headshot-crop-copy.jpg?resize=60%2C60&#038;p=1\" alt=\"Alex Blake\">\t\t\t\t<\/p>\n<\/p><\/div>\n<div>\n<p><span><br \/>\n\t\t\t\tBy<br \/>\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.digitaltrends.com\/users\/alexblake\/\" rel=\"author\"><br \/>\n\t\t\t\t\t\tAlex Blake\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/span><\/p>\n<p>\t\t<time datetime=\"2023-03-31T04:19:25-07:00\"><br \/>\n\t\t\tMarch 31, 2023 4:19AM\t\t<\/time>\n\t<\/p>\n<\/div>\n<p><\/cite><\/p>\n<\/header>\n<article id=\"dt-post-content\" itemid=\"post-content\" itemprop=\"articleBody\">\n<p>A security researcher was recently able to change the top results in Microsoft\u2019s <a href=\"https:\/\/www.digitaltrends.com\/computing\/how-to-use-microsoft-chatgpt-bing-edge\/\">Bing search engine<\/a> and access any user\u2019s private files, potentially putting millions of users at risk \u2014 and all it took was logging into an unsecured web page.<\/p>\n<p>The exploit was discovered by researcher Hillai Ben-Sasson at their team at Wiz, a cloud security firm. <a href=\"https:\/\/www.wiz.io\/blog\/bingbang\" target=\"_blank\" rel=\"noopener\">According to Ben-Sasson<\/a>, it would not only allow an attacker to change Bing search results but would also grant them access to millions of users\u2019 private files and data.<\/p>\n<div data-provider=\"youtube\">\n<p>The #BingBang &#8211; a Bing.com vulnerability discovered by Wiz Research<\/p>\n<\/div>\n<p>Dubbed BingBang by the research group, the vulnerability centered on Microsoft\u2019s Azure Active Directory, which is used by enterprises to manage user identities and access to apps. Unfortunately, if an app is misconfigured, any Azure user in the world can log into it without the proper credentials.<\/p>\n<p>Shockingly, the researchers noted in a <a href=\"https:\/\/www.wiz.io\/blog\/azure-active-directory-bing-misconfiguration\" target=\"_blank\" rel=\"noopener\">technical analysis<\/a> of the bug that up to 25% of all multi-user apps they scanned were vulnerable \u2014 including a Microsoft app named Bing Trivia.<\/p>\n<p>After exploiting the flaw to log into the Bing Trivia app, the Wiz team found a content management system (CMS) tied to Bing.com that was controlling the search engine\u2019s live results. With a touch of humor, they then altered one of the entries, changing the top result for \u2018best soundtracks\u2019 from the Dune score to that from the 1995 movie Hackers.<\/p>\n<p>However, there\u2019s nothing funny about what this flaw implies. As the researchers explained, \u201ca malicious actor landing on the Bing Trivia app page could therefore have tampered with any search term and launched misinformation campaigns, as well as phished and impersonated other websites.\u201d<\/p>\n<h2><a id=\"dt-heading-stealing-private-files-and-emails\" aria-label=\"Stealing private files and emails\"><\/a>Stealing private files and emails<\/h2>\n<figure id=\"attachment_3312872\" aria-describedby=\"caption-attachment-3312872\"><img src=\"https:\/\/www.digitaltrends.com\/wp-content\/uploads\/2023\/03\/Microsoft-BingBang-exploit.jpg?fit=720%2C480&#038;p=1\" onerror=\"dti_load_error(this)\" decoding=\"async\" alt=\"A comparison of Bing search results before and after the BingBang exploit was applied, showing how the list of recommended movie soundtracks could be altered.\" previous-src=\"https:\/\/www.digitaltrends.com\/wp-content\/uploads\/2023\/03\/Microsoft-BingBang-exploit.jpg?fit=720%2C480&#038;p=1\"><figcaption id=\"caption-attachment-3312872\"><span>Wiz<\/span><\/figcaption><\/figure>\n<p>What\u2019s more, the researchers were able to add a harmless cross-site scripting (XSS) payload into Bing while they were logged in. This was able to run as expected, without interference. After reporting the issue to Microsoft, the researchers tried modifying this XSS payload to see what was possible.<\/p>\n<p>Because Bing integrates with <a href=\"https:\/\/www.digitaltrends.com\/computing\/microsoft-365-copilot-unleashes-chatgpt\/\">Microsoft 365<\/a>, the Wiz team was able to create a script that could potentially steal a logged-in user\u2019s access tokens, granting them access to that user\u2019s cloud data. That could include <a href=\"https:\/\/www.digitaltrends.com\/computing\/how-to-schedule-email-in-outlook\/\">Outlook emails<\/a>, calendars, Teams messages, OneDrive files, and more.<\/p>\n<p>Put together, that means a hacker could have the power to redirect Bing search results to a malicious website, and at the same time harvest private data from any user logged in on a Microsoft 365 account. All from exploiting a simple login vulnerability.<\/p>\n<p>Fortunately, the researchers immediately reported the flaw to Microsoft and it was patched shortly afterward, resulting in a $40,000 bug bounty reward. Yet it remains an alarming example of how little effort can be required to steal private data from millions of unsuspecting users.<\/p>\n<h4>\n\tEditors&#8217; Recommendations<\/h4>\n<ul>\n<li>\n\t\t\t<a href=\"https:\/\/www.digitaltrends.com\/computing\/microsoft-adds-personality-options-to-bing-chat\/\"><br \/>\n\t\t\t\tThis new Microsoft Bing Chat feature lets you change its behavior\t\t\t<\/a>\n\t\t<\/li>\n<li>\n\t\t\t<a href=\"https:\/\/www.digitaltrends.com\/computing\/bing-users-will-be-able-to-test-out-the-integrated-chatgpt\/\"><br \/>\n\t\t\t\tCheck your inbox \u2014 Microsoft just sent out the first wave of ChatGPT Bing invites\t\t\t<\/a>\n\t\t<\/li>\n<li>\n\t\t\t<a href=\"https:\/\/www.digitaltrends.com\/computing\/hacker-steals-one-billion-peoples-records-in-huge-data-breach\/\"><br \/>\n\t\t\t\tHacker steals 1 billion people\u2019s records in unprecedented data breach\t\t\t<\/a>\n\t\t<\/li>\n<li>\n\t\t\t<a href=\"https:\/\/www.digitaltrends.com\/computing\/microsoft-bing-focing-wont-win-search-engine-wars\/\"><br \/>\n\t\t\t\tMicrosoft will never win the search engine wars by forcing people to use Bing\t\t\t<\/a>\n\t\t<\/li>\n<li>\n\t\t\t<a href=\"https:\/\/www.digitaltrends.com\/computing\/microsoft-search-windows-bing\/\"><br \/>\n\t\t\t\tBing, Windows search evolve into new, cross-platform Microsoft Search\t\t\t<\/a>\n\t\t<\/li>\n<\/ul>\n<p>\t\t\t\t<span id=\"publisher-md\" itemprop=\"publisher\" itemscope itemtype=\"https:\/\/schema.org\/Organization\"><br \/>\n\t\t\t\t\t<span itemprop=\"url\" itemtype=\"https:\/\/schema.org\/Url\" content=\"https:\/\/www.digitaltrends.com\"><br \/>\n\t\t\t\t\t\t<span itemprop=\"logo\" itemscope itemtype=\"https:\/\/schema.org\/ImageObject\"><br \/>\n\t\t\t\t\t\t\t<meta itemprop=\"url\" content=\"https:\/\/cdn.dtcn.com\/dt\/dt-logo-small.png\"><br \/>\n\t\t\t\t\t\t\t<meta itemprop=\"width\" content=\"0\"><br \/>\n\t\t\t\t\t\t\t<meta itemprop=\"height\" content=\"0\"><br \/>\n\t\t\t\t\t\t<\/span><\/p>\n<p>\t\t\t\t\t\t<meta itemprop=\"name\" content=\"Digital Trends\"><br \/>\n\t\t\t\t\t<\/span><\/p>\n<p>\t\t\t\t\t<span itemprop=\"image\" itemscope itemtype=\"https:\/\/schema.org\/ImageObject\"><br \/>\n\t\t\t\t\t\t<meta itemprop=\"url\" content=\"https:\/\/www.digitaltrends.com\/wp-content\/uploads\/2023\/02\/The-new-Bing-preview-screen-appears-on-a-Surface-Laptop-Studio.jpg?p=1\"><br \/>\n\t\t\t\t\t<\/span><br \/>\n\t\t\t\t<\/span><\/p>\n<div>\n<div>\n<div>\n<p>\n\t\t\t\t\tNetgear router bug let hackers steal classified documents on drones, tanks\t\t\t\t<\/p>\n<p>\n\t\t\t\t\t\tNetgear says exploit that led to stolen documents was fixed a long time ago\t\t\t\t\t<\/p>\n<\/p><\/div>\n<p><img src=\"https:\/\/www.digitaltrends.com\/wp-content\/uploads\/2018\/07\/reaperdrone01.jpg?resize=625%2C417&#038;p=1\" alt=\"router exploit hacker steal military reaperdrone01\" decoding=\"async\" previous-src=\"https:\/\/www.digitaltrends.com\/wp-content\/uploads\/2018\/07\/reaperdrone01.jpg?resize=625%2C417&#038;p=1\">\t\t\t<\/p>\n<div>\n<p>A U.S. Air Force MQ-9 Reaper drone. EthanMiller\/GettyImages<\/p>\n<p>Hackers have managed to gain entry to classified documents on an Air Force captain&#8217;s computer after they exploited a known flaw in a Netgear router. Although the full extent of the data theft is still being quantified, the maintenance documents for the MQ-9 Reaper drone were stolen, as well as training manuals for the M1 Abrams tank, and defense tactics for tackling improvised explosive devices, were all found for sale on the dark web,\u00a0Ars Technica reported. Netgear has since clarified to Digital Trends that the exploit used in the attack was fixed a long time ago in several firmware updates to its hardware.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.digitaltrends.com\/computing\/router-exploit-hacker-steal-military\/\"><br \/>\n\t\t\t\tRead more\t\t\t<\/a>\n\t\t<\/p>\n<\/div>\n<div>\n<div>\n<p>\n\t\t\t\t\tCortana flaw enables hackers to load malicious websites from the lock screen\t\t\t\t<\/p>\n<\/p><\/div>\n<p><img src=\"https:\/\/www.digitaltrends.com\/wp-content\/uploads\/2014\/10\/windows-10-cortana-v2.jpg?resize=625%2C417&#038;p=1\" alt=\"cortana in windows 10 will support six new countries including japan australia and canada v2\" decoding=\"async\" loading=\"lazy\" previous-src=\"https:\/\/www.digitaltrends.com\/wp-content\/uploads\/2014\/10\/windows-10-cortana-v2.jpg?resize=625%2C417&#038;p=1\">\t\t\t<\/p>\n<p>Two independent Israeli researchers recently discovered that anyone with access to a Windows 10 PC could use Cortana and a USB-based network adapter to download and install malware even if the machine remained locked. This was accomplished using voice commands directed to Cortana, which could load up a malicious website in a browser without unlocking Windows. The PC could also be moved to a wireless network controlled by the hacker.\u00a0<br \/>\nThe two researchers, Tal Be&#8217;ery and Amichai Shulman, presented their method in a session called, &#8220;The Voice of Esau: Hacking Enterprises Through Voice Interfaces&#8221; during the Kaspersky Analyst Security Summit in Cancun, Mexico,\u00a0last week. Their attack relied on Cortana&#8217;s ability to keep the microphone active at all times to receive voice commands, especially PCs that aren&#8217;t restricted to a single user&#8217;s voice. The attack also required physical access to the target PC.\u00a0<br \/>\nIn their scenario, a hacker could sit down in front of a locked Windows 10 PC and insert a network adapter into one of the USB slots. After that, the hacker could verbally tell Cortana\u00a0to open the web browser and head to any specific HTTP-based address that doesn&#8217;t rely on a secure connection (HTTPS means the connection is encrypted). The inserted adapter receives the outgoing command but directs the web browser to a malicious website instead.\u00a0<br \/>\nThe malicious destination is designed to download malware to the machine even though it&#8217;s still locked. After that, the PC is at the mercy of the hacker. As previously stated, a hacker with physical access to the Windows computer can switch to a wireless, malicious network through the USB adapter: just click on the destination using a mouse even though the PC remains locked.\u00a0<br \/>\nWindows 10 provides several settings regarding Cortana. For starters, device owners can toggle on or off the ability for the virtual assistant to respond to the &#8220;Hey Cortana&#8221; voice command. There is also a checkbox to prevent the device from sleeping when it&#8217;s plugged in so Cortana can respond to commands. Most importantly, there are two main settings for voice command acceptance: Let Cortana respond to anyone or lock Cortana to one specific voice.\u00a0<br \/>\nThat is not all. There is a specific setting for the lock screen, enabling users to enable or disable voice commands while the PC remains locked. Windows 10 also provides a keyboard shortcut you can toggle to disable or enable Cortana commands after pressing the Windows logo key and the &#8220;C&#8221; key simultaneously. \u00a0<br \/>\n&#8220;We still have this bad habit of introducing new interfaces into machines without fully analyzing the security implications of it,&#8221; Be&#8217;ery\u00a0said. &#8220;Every new machine interface that we introduce creates new types of vehicles to carry an attack vector into your computer.&#8221;\u00a0<br \/>\nUltimately, Microsoft resolved the issue discovered by Be&#8217;ery and Shulman. Browser-based commands made to Cortana on the lock screen now go directly to Bing, the company&#8217;s search engine. But because Cortana responds to other commands, the duo is currently investigating how these commands can be used for malicious purposes as well.\u00a0<\/p>\n<p><a href=\"https:\/\/www.digitaltrends.com\/computing\/microsoft-fixes-cortana-lock-screen-bug-malware\/\"><br \/>\n\t\t\t\tRead more\t\t\t<\/a>\n\t\t<\/p>\n<\/div>\n<div>\n<div>\n<p>\n\t\t\t\t\tGoogle may soon let you test your internet speed straight from search results\t\t\t\t<\/p>\n<\/p><\/div>\n<p><img src=\"https:\/\/www.digitaltrends.com\/wp-content\/uploads\/2016\/02\/google-campus-hq-headquarters-home-offices.jpg?resize=625%2C417&#038;p=1\" alt=\"google campus\" decoding=\"async\" loading=\"lazy\" previous-src=\"https:\/\/www.digitaltrends.com\/wp-content\/uploads\/2016\/02\/google-campus-hq-headquarters-home-offices.jpg?resize=625%2C417&#038;p=1\">\t\t\t<\/p>\n<div>\n<p>As consumers become increasingly aware of the importance of a speedy internet connection for getting the most out of the web&#8217;s broad spectrum\u00a0of\u00a0services, so more and more users\u00a0are conducting Google searches for tools\u00a0that test their provider\u2019s performance.<\/p>\n<p>Finally waking up to the fact, the Mountain View company\u00a0is reportedly trialing its own internet speed service, embedding it at the top of relevant search inquiries.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.digitaltrends.com\/web\/google-internet-speed-test\/\"><br \/>\n\t\t\t\tRead more\t\t\t<\/a>\n\t\t<\/p>\n<\/div><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.digitaltrends.com\/computing\/bing-exploit-change-search-results-steal-files\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Alex Blake<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Alex Blake March 31, 2023 4:19AM A security researcher was recently able to change the top results in Microsoft\u2019s Bing search engine and access any user\u2019s private files, potentially putting millions of users at risk \u2014 and all it took was logging into an unsecured web page. The exploit was discovered by researcher Hillai<\/p>\n","protected":false},"author":1,"featured_media":623941,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2509,183,46],"tags":[],"class_list":{"0":"post-623940","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-change","8":"category-hackers","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/623940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=623940"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/623940\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/623941"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=623940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=623940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=623940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}