STE WILLIAMS

Debug Feature in Web Dev Tool Exposed Trump Campaign Site, Others to Attack

The problem is not with the tool itself but with how some developers and administrators are using it, Comparitech says.

US President Donald Trump’s main campaign website was one of more than 100 domains found vulnerable to attack recently because its developers had apparently forgotten to disable the debug mode in a tool that was used to develop the site.

The issue with Trump’s site was addressed Wednesday after researchers from Comparitech informed the campaign about it. Had the security weakness been left open, attackers would have had – among other things— an opportunity to hijack the site’s email server and send out messages on behalf of email.donaldtrump.com, Comparitech said.

According to the vendor, it is not clear when the debug mode was enabled on the Trump website. But the potential consequences of even a short exposure would have been severe. “Trump’s campaign website is used to solicit donations, after all,” the vendor noted. “Attackers could have intercepted correspondence with Trump supporters or phish campaign contributors, among other crimes.”

The problem on Trump’s site and on hundreds of others has to do with their use of a popular PHP framework called Laravel.

Laravel includes a suite of tools that can be used to build, test, and deploy Web applications, says Paul Bischoff, lead researcher at Comparitech. Many people use it to speed up the website development process. “Laravel is one of, if not the, most popular PHP frameworks,” Bischoff says.

Laravel, like other frameworks, incorporates a debug mode that developers can use to identity misconfigurations and other errors on their sites before they go live. Developers can access the debug interface via a standard Web browser.

Problems can arise when developers inadvertently leave the debug mode enabled after the site has gone live. This can expose critical site details, including passwords, encryption keys, API credentials, and database locations.

Adversaries can use the data to develop further attacks on the site or to steal data from it, Comparitech said. By leaving the Laravel debug mode enabled on the Trump site, for instance, developers exposed in plain text a mail server configuration that was visible from any browser though the debug interface.

Anyone could have accessed it from a Web browser by going to a special subdomain. “It’s a subdomain that the average user might not come across,” Bischoff says. “But it was visible on search engines like Shodan that can scan for such vulnerabilities. It was easy for hackers to find.”

The issue is not confined to Laravel, and neither is it the software vendor’s fault. Developers often leave websites vulnerable by inadvertently failing to disable the tools they use for identifying problems when building it. The key takeaway for organizations is to “disable debug mode before going live,” Bischoff says.

Comparitech, working with two independent security researchers, conducted an Internetwide search and found a total of 768 websites with active Laravel sessions. Of them, between 10% and 20% had exposed their debug APIs, making them vulnerable to attack. A similar effort by one of the security researchers last year unearthed 566 websites with the Laravel debug mode enabled.

Bischoff says Comparitech, which scans the Web for misconfigured websites and vulnerable databases, is still in the process of notifying all impacted websites discovered from its latest scan of the issue. Presently, it remains unclear how many might have addressed the problem, he says.

With the exception of the Trump campaign site, most of the vulnerable websites that Comparitech discovered in its latest scan were small businesses and charities.

Related Content:

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/application-security/debug-feature-in-web-dev-tool-exposed-trump-campaign-site-others-to-attack/d/d-id/1336116?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Older Amazon Devices Subject to Old Wi-Fi Vulnerability

The vulnerability in first-generation Echoes and eight-generation Kindles lets an attacker wage man-in-the-middle attacks.

Som old Amazon devices contain an even older Wi-Fi vulnerability that can be exploited in man-in-the-middle attacks.

The vuln – KRACK, or Key Reinstallation Attack – is a flaw in the four-way WPA2 handshake that begins the protected transaction. The vulnerability  leaves the wireless traffic encrypted, but routed through a malicious middle actor that decrypts the data, stores it for use, and then re-encrypts the stream and sends it on its way.

The ESET Smart Home Research Team discovered that first-generation Amazon Echo devices remain subject to the vulnerability, designated CVE-2017-13077, as do Kindle 8th generation e-book readers.

Amazon has issued and distributed a new version of the wpa_supplicant — the vulnerable part of the operating environment. Both Amazon and the researchers strongly suggest that all users make sure that the patch has been applied to their devices.

For more, read here.

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/older-amazon-devices-subject-to-old-wi-fi-vulnerability/d/d-id/1336120?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Remember the Democratic National Committee email leak? Same hackers now targeting EU countries, say malware boffins

The hacker crew behind the US Democratic National Committee breach are still at it and have infiltrated an EU country’s embassy in Washington DC, according to infosec biz ESET.

The Dukes, aka APT29 or Cozy Bear, were widely fingered as having been behind the infamous hack on the DNC, the governing body of the US opposition political party. Though the group seemed to have faded back into digital obscurity, ESET said today that they’re still operating against EU countries.

ESET has identified three new malware families associated with the hacking crew, which it has named PolyglotDuke, RegDuke and FatDuke.

“One of the first public traces of this campaign can be found on Reddit in July 2014,” said researcher Matthieu Faou. “We can confirm with high confidence that the same group is behind Operation Ghost Hunt and the DNC attack,” he added.

ESET declined to name which countries had been infected, though it said that these were three EU countries and the US embassy of one of those nations.

APT29 has, so ESET says, used Twitter and Reddit to host its command-and-control URLs and also employs steganographic techniques. In Bratislava earlier this week the firm briefed El Reg on its findings, which are set out in full here, along with a white paper accessible from the link.

Concealed weapon

One intriguing technique seen by ESET was the use of steganography in images. In one example shown to us, a malware payload was hidden within image attribute metadata fields of an otherwise unaltered PNG file.

“We found strong code similarities between already documented samples and samples from Operation Ghost. We cannot discount the possibility of a false flag operation, however, this campaign started while only a small portion of the Dukes’ arsenal was known. In 2013, at the first known compilation date of PolyglotDuke, only MiniDuke had been documented and threat analysts were not yet aware of the importance of this threat actor. Thus, we believe Operation Ghost was run simultaneously with the other campaigns and has flown under the radar until now,” said the company in a statement.

Linked to Russian intelligence by just about everyone (except ESET, oddly), APT29 cracked the DNC’s servers by using a SeaDaddy implant developed in Python and compiled with py2exe and another Powershell backdoor.

That was then deployed through a variety of remote access tools – and less sophisticated methods, as former US presidential hopeful Hilary Clinton’s campaign manager, John Podesta, found out to his cost. ®

Sponsored:
Your Guide to Becoming Truly Data-Driven with Unrivalled Data Analytics Performance

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/17/apt29_still_active_eset_dukes_cozy_bear/

A cautionary, Thames Watery tale on how not to look phishy: ‘Click here to re-register!’

Thames Water found itself in warm, er, water this week after a clunky migration effort left customers receiving emails that looked like a particularly sophisticated spear-phishing attack.

A Register reader got in touch after receiving an email purporting to be from the company and requesting that he re-register his online account. His original account number was shown, along with a big, colourful button inviting a click.

A classic spear-phishing tactic, compounded by the fact that that button did not go to thameswater.co.uk, from where the email came, but rather online-thameswater.co.uk, the homepage of which could well worry technical and non-technical users alike.

The email was genuine. The problem, according to a spokesperson for Thames Water, was that not all data had survived the migration from the company’s 40-year-old billing system to something new and shiny.

The system, they said, was “being rolled out across our whole customer base. We need them to re-register their online account to ensure they can make the most of the new system and any future enhancements to it safely and securely.”

Hence the very iffy-looking email: “We’re sorry for any concern this has caused and always encourage our customers to contact us if they’re ever unsure about any letters, emails, calls or visits they receive from us or anyone claiming to be from Thames Water.”

The company has indeed, according to one Reg tipster, seen an uptick in calls from customers on the receiving end of what looks distressingly like a spear-phishing attack.

Speaking to The Register, ESET security specialist Jake Moore warned that cybercriminals had a knack for obtaining information like account numbers and told us “within the email there should never be a link to their website”.

“When people want to double-check, the best way is to log in via a usual method rather than [via] a link in an email.”

He went on to say that “there should be advice for their customers to head to the website via their own means such as a via Google search or even better, the genuine link that has been bookmarked by the customer.”

“Many companies,” he concluded, “want ease and convenience over anything else for their customers, but as more people become security-focused and risk-averse, such emails need to go above and beyond to show they are the genuine article or they will simply not get anywhere.”

Of course, had the migration from the old billing system not required customers to re-register themselves, the missive would not have been needed.

“To think,” observed an anonymous Register reader on the receiving end of Thames Water’s emission, “it could all have been avoided with a bit of Perl.” ®

Sponsored:
Your Guide to Becoming Truly Data-Driven with Unrivalled Data Analytics Performance

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/17/phishing_101_click_here_to_reregister/

Data Privacy Protections for the Most Vulnerable

The business case for why companies that respect the privacy of individuals, and especially minors, will have a strong competitive advantage.

The news last month that Google agreed to pay $170 million to settle alleged privacy violations related to YouTube and children and an October 7 Federal Trade Commission review of Children’s Online Privacy Protection Act (COPPA) are bringing a critical focus on protecting minors, who can’t take action or understand the concept of privacy enough to protect their data. 

The COPPA review, which is coming several years ahead of schedule, aims to bring US privacy regulations up to speed with the latest technologies and trends, including growing numbers of minors using online services and being targeted with ads. It’s a clear acknowledgement that traditional legislative and regulatory standards and processes are failing to keep up with the rapidly evolving digital landscape. Not only have online services changed greatly since COPPA was last revised in 2013, but the nature of data has changed, as have notions about what constitutes “personal information.” There are more data sources and types of information being collected from everyone, particularly children. And the uses of data today have increased beyond what we could have imagined six years ago. All of this means companies need to rethink the nature of their role; they are data stewards, responsible for securing and caring for their customers’ information, and not owners of the data. This is a crucial distinction. 

COPPA critics who dismiss the regulations as onerous for business are overlooking an important duty of online providers — that of protecting children who can’t provide legal consent for data use. Society has a responsibility to its most vulnerable group of online citizens. The California Consumer Privacy Act (CCPA) has an opt-in standard for the sale of data belonging to minors, requiring websites to explicitly get permission from parents of children under 13 and from teenagers themselves up to age 16. This will become the norm going forward. To comply with both COPPA and CCPA, online providers will need to ask users to confirm that they are 16 or older. This won’t solve all the privacy issues for minors, but it’s a step in the right direction. With COPPA, the conversation about data privacy gets right to the heart of the matter: why and how things need to change.

So, knowing that changes in COPPA will be coming in the near future, and given the requirements of CCPA and the General Data Protection Regulation (GDPR), what steps can companies take? At the highest level, companies need to be prepared to embrace consumer data privacy both culturally and technologically — and do so in a way that allows their organization to evolve alongside technology and regulatory changes. There are three keys to making this vision a reality:

Step 1: Make Data Privacy Part of Corporate DNA
Embracing consumer data privacy starts with culture change, and it must come from the top. This means aligning the company’s culture and values with the privacy program and reinforcing this in internal and external messaging, product design choices and engineering. From the board of directors and the CEO, to the chief information security officer and chief privacy officer and on down, everyone needs to be committed to making data privacy a business priority. Companies should integrate the data privacy program into the code of conduct and existing business processes; conduct regular privacy trainings with employees; add risk management assessment to new business, mergers, and other business arrangements; and regularly assess the efficacy and performance of data privacy processes and practices throughout the organization.

Step 2: Create the Competency to Become (and Stay) Compliant
Don’t wait for regulators to come knocking. The sooner you get ahead of data compliance, the more readily you can adapt to changes in the regulatory environment. First, you need systems in place to help you understand what data you have and where it’s stored. Ask important questions such as: Should we be collecting it? Is it properly secured? Who is it being shared with? Companies need to understand identity based on whose data they have, where it resides, and how it is used. Companies can’t just rely on manually doing surveys of their data and filling in spreadsheets for privacy assessments.

Because GDPR, CCPA, and other regulations are predicated on the notion of user consent, the inability of children to provide consent underscores one of the key challenges — the need to locate both PI (personal information) and PII (personally identifiable information). Most children don’t have credit cards or even email addresses that can be linked with their identity, but their online activities generate lots of personal data that can be indirectly tied back to their identities. GDPR and CCPA require businesses to be able to know what PII and PI they collect, where it is, and how it’s being used. This data is typically scattered around different applications and in both structured and unstructured formats in the data center and the cloud. Companies must be able to discover and manage all of it.

Step 3: Be Good Data Stewards
For too long, companies have made use of and built businesses around customer data without acknowledging that they are merely guardians of the data, not owners. In a post-Cambridge Analytica and post-GDPR world, companies can’t be careless with data. They need to be transparent about what information they are collecting and recognize customer rights to control how their data is used. This shift is vital for businesses to keep customers happy.

Protecting data privacy isn’t just about being compliant, it’s also smart business. Consumers are increasingly attentive to how companies treat their data and upset when companies show a disregard for data privacy. A survey late last year of US consumers found that nearly 40% were cutting back on social media use due to privacy concerns and 80% or more want to know where the data is and would like a say in whether their data is sold or shared.

Companies that don’t prioritize their responsibilities related to data ownership and care — particularly regarding children’s data — will lose customer trust and harm their brand, as well as face fines and other penalties that will no doubt come with a revised COPPA. Companies that respect the privacy of individuals and especially minors and view data privacy as a fundamental business objective and not just an obligation will have a strong competitive advantage. 

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “How to Build a Rock Solid Culture

Dimitri Sirota is a 10+ year privacy expert and identity veteran. He is CEO and cofounder of data protection and privacy software company BigID. Prior to starting BigID, Dimitri founded two enterprise software companies focused on security (eTunnels) and API management (Layer … View Full Bio

Article source: https://www.darkreading.com/endpoint/data-privacy-protections-for-the-most-vulnerable---children-/a/d-id/1336062?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Cozy Bear Emerges from Hibernation to Hack EU Ministries

The cyber-espionage group, linked to Russia and blamed for hacking the Democratic National Committee in 2016, has been using covert communications and other techniques to escape detection for at least two years.

Following its compromise of the network and servers of the Democratic National Committee (DNC) in 2016, the Russia-linked espionage group Cozy Bear, also known as APT29 and the Dukes, has focused on staying off the radar of intelligence services and security companies.

Yet the group has remained active, using covert communications — such as hiding information and commands in images, a technique known as steganography — to remain largely undetected. According to a report published today by security firm ESET, the group has compromised three European ministries of foreign affairs and the Washington, DC, embassy of an EU member. The report suggests that even after Cozy Bear was in the spotlight following the DNC breach, it recovered and rebuilt most of its tools and operations.

“Even if the group has managed to avoid public scrutiny for several years, they actually were very active compromising high-value targets and developing new tools,” says Matthieu Faou, a malware researcher with ESET. “They have been operational for around 10 years, starting around 2008 [or] 2009. Since then, they have been active almost all the time.”

As the United States starts another election cycle, this one promising to be even more chaotic than the last, signs of cyberattacks have garnered increasing attention. Cozy Bear has typically targeted Western countries or nations that had been part of the former USSR.

“Besides governments, the group also has targeted various organizations linked to NATO, think tanks, and political parties,” ESET stated in the report. “This targeting suggests a clear interest in collecting information allowing a better understanding of future international political decisions, which would seem of most interest to a government.”

The ESET report is not the only research to attribute attacks to the group. In 2018, security and incident-response firm FireEye linked phishing attacks purporting to be from the US Department of State to APT29 — its monicker for the Cozy Bear group. The attacks attempted to compromise systems in the government, defense, pharmaceutical, and transportation sectors, the company said at the time.

The connection to Cozy Bear, however, was circumstantial. The attackers used some tools and techniques that were hallmarks of the Cozy Bear group but could have been co-opted by another attacker as part of a “false flag” operation. In the current investigation, the group tracked by ESET used a spear-phishing campaign to kick off the attacks — a technique linked to Cozy Bear.

This time around, Cozy Bear — which ESET refers to as The Dukes — has used a variety of covert and public channels for communication in an attempt to escape detection. 

The group has used Twitter, Imgur, and Reddit as a primary way to issue commands to systems immediately after compromise. Cozy Bear generates new Twitter handles using an algorithm generator, from which compromised machines will fetch encrypted URLs.

The group also has used public cloud services, such as OneDrive, to hide communications in legitimate services. Often, the group hides data inside of images, which is very hard to detect, says ESET’s Faou.

“[Steganography] is quite complex to implement, so it is not that common,” he says. “It’s hard to detect because even after the image is altered to contain commands or payloads, it is still valid. So by looking at the network traffic only, it is hard to detect that something suspicious is ongoing.”

In addition, the group is using three new malware families in its current operations, dubbed by ESET as PolyglotDuke, RegDuke, and FatDuke. ESET also discovered a fourth malware sample, LiteDuke, used in older campaigns that had not previously been described.

PolyglotDuke uses Twitter and other websites to fetch the address of the command-and-control server. RegDuke establishes persistance by hiding in the registry and using Dropbox to reconstitute a connection back to an attacker-controlled server. FatDuke is a client that is installed after the MiniDuke backdoor, offers a great deal of functionality, and uses obfuscation to make its code difficult to decipher.

The previously known MiniDuke is a backdoor that gets installed after the initial infection and allows the attacker to issue commands to the infected system. In the past, LiteDuke was used to further compromise systems after MiniDuke, but it is seems to be outdated, ESET stated.  

The group also widely uses credentials to move throughout a network, compromising additional systems and reinfecting systems while a company is still responding to an incident.

“When responding to a Dukes compromise, it is important to make sure to remove every implant in a short period of time,” ESET stated in the report. “Otherwise, the attackers will use any remaining implant to compromise the cleaned systems again.”

While ESET based its attribution on an accumulation of evidence, the company also stressed that it comes with a caveat and that the company does not link attacks to specific actors.

“We cannot discount the possibility of a false flag operation,” the company stated in the report. “However, this campaign started while only a small portion of the Dukes’ arsenal was known. In 2013, at the first known compilation date of PolyglotDuke, only MiniDuke had been documented and threat analysts were not yet aware of the importance of this threat actor.”

Related Content

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: How to Build a Rock-Solid Cybersecurity Culture.”

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/cozy-bear-emerges-from-hibernation-to-hack-eu-ministries/d/d-id/1336111?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Yahoo Breach Victims May Qualify for $358 Payout

Pending approval of the settlement, affected account holders may be eligible for a payout or two years of free credit monitoring.

Yahoo account holders who were among the 3 billion affected in a series of data breaches between 2013 and 2016 could qualify for a cash payout or two years of free credit monitoring.

The settlement is still awaiting approval by the California courts, CNN reports, and the process could take more than a year. If it is approved, Yahoo may divide more than $117.5 million among people whose information (names, email addresses, and passwords) was compromised.

Members of the settlement class had a Yahoo account between Jan. 1, 2012, and Dec. 31, 2016, received a notice about the security incidents, and are residents of the United States or Israel.

Those who qualify may submit claims to yahoobreachsettlement.com and file for a $100 payout if they can prove they use a credit monitoring service that will protect them for at least a year. The final amount may be more – up to $358 – depending on how many people submit claims, though it’s expected the payout will be less given the total amount of people affected.

Read more details here.

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/endpoint/yahoo-breach-victims-may-qualify-for-$358-payout/d/d-id/1336113?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Adobe fixes 46 critical bugs in patchfest

Adobe patched a total of 82 vulnerabilities across a range of products on Tuesday, including 46 critical bugs.

The lion’s share of the patches, which the company flagged on 11 October, came in a single advisory covering Acrobat and Acrobat Reader on the Windows and macOS platforms, extending back to the Classic 2015 versions.

There were 45 critical bugs in this batch, allowing for arbitrary code execution thanks to a range of weaknesses covering type confusion, race conditions, and memory issues such as out-of-bounds write, use after free, buffer overrun, and heap overflow.

The company said:

Successful exploitation could lead to arbitrary code execution in the context of the current user.    

Other bugs in this collection, ranked important, could be triggered via cross-site scripting, out-of-bounds reads, and what Adobe called an “incomplete implementation of security mechanism,” although like many of the bugs, details on that one hadn’t been published.

Adobe also patched a single important-ranking vulnerability in the Windows Adobe Download Manager (CVE-2019-8071), which allowed for privilege escalation through insecure file permissions.

There were 12 vulnerabilities in its Experience Manager content management system, including CVE-2019-8088, a critical command injection vulnerability that could lead to arbitrary code injection. Experience Manager Forms, which lets people create online sign-up forms, had one moderate-ranking vulnerability that Adobe said could “result in sensitive information disclosure”.

People can update their products in various ways, Adobe said. Consumers can either wait for the products to detect the update themselves, or give them a nudge by choosing Help/Check for Updates. If you use Acrobat Reader, you can also run the full installer by downloading it from the Acrobat Reader Download Centre, it said.

Admins can perform mass updates in two steps. First, download the enterprise installers from Adobe’s FTP site, and then use your chosen tools, such as SSH sessions into macOS boxes or scheduling Windows updates with Microsoft’s System Center Configuration Manager.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/g6fa2l2I0F8/

Hackers hack card details from BriansClub carding site

Hackers have hacked BriansClub, one of the biggest black market sites trafficking in stolen credit card data, whisking away the data of more than 26 million payment cards.

Security journalist Brian Krebs reported that last month, a source shared a plain text file containing what they claimed to be the full database of cards for sale, both currently and historically, at BriansClub.

That cache contains details stolen from bricks-and-mortar retailers over the past four years, including nearly eight million uploaded so far in this year alone.

Krebs reports that the data hacked out of the carder site has been shared with people who work with financial institutions that identify, monitor, or reissue compromised cards that show up for sale on criminal forums. BriansClub mostly resells cards stolen by other cybercrooks, known as resellers or affiliates, who earn a (currently undetermined) percentage from each sale, Krebs says.

As we’ve noted in the past when reporting about payment card theft, “carding” is a general term for a range of related crimes, including:

  • Stealing card numbers using skimming devices – often installed at gas stations – or data-grabbing malware installed at point-of-sale systems in restaurants or stores.
  • Buying and selling card numbers and related personal information.
  • Using illegally acquired card details for online fraud, often to buy products for cut-price resale.
  • Making fake cards, encoded with stolen data, that rack up charges against other people’s accounts.
  • Using fake cards to withdraw money from ATMs in return for a cut of the proceeds.
  • Going on spending sprees with fake cards to buy products for cut-price resale.

Krebs says that most of what’s for sale at BriansClub are strings of data that can be encoded onto anything with a magnetic stripe the size of a credit card, which can then be used to go on those fake-card spending sprees.

He calculates that with cardholder losses estimated at around $500 per card, BriansClub could have generated as much as $4 billion from the roughly nine million cards it’s sold to fraudsters since 2015.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/RIxUWTXL53k/

Robotic hand solves Rubik’s Cube by learning how to learn about it

Can you solve a Rubik’s Cube? How about with one hand?

That’s what artificial intelligence (AI) research company OpenAI has taught a robot to do: using neural networks but leaving it up to the system to figure out how to overcome hurdles, it’s taught a human-like, robotic hand to solve the puzzle single-handedly.

This isn’t the first time that a robot has solved the Rubik’s Cube. In June 2019, an MIT robot – fast as greased pistons, but not at all human-hand-like – did it in the record-shattering time of .38 seconds. (Compare that with the fastest record for a human, which is held by Australian Feliks Zemdegs, who solved it in 4.22 seconds in 2018.)

The company said on Tuesday that it’s been trying to train a human-like, robotic hand to solve the puzzle since May 2017. The company chose the task of training such a hand to solve a Rubik’s Cube because it’s a complex manipulation task that lays the groundwork for general-purpose robots to do all manner of other tasks.

OpenAI solved the Rubik’s Cube, in simulation, in July 2017. But as of July 2018, it had only managed to get the IRL robot to manipulate a block. Now, it’s reached its initial goal of teaching the robot to solve the puzzle – at least, some of the time.

Challenges

Solving a Rubik’s Cube can be tough even for humans. It requires a great deal of dexterity and can take years to master. OpenAI’s robotic hand is still perfecting its technique and is now solving the cube 60% of the time, at best, when it’s been scrambled with only 15 rotations. When scrambling the cube for maximum difficulty, with 26 face rotations, that drops to 20%.

The researchers didn’t tell the hand how to move in order to get to a solved cube. They did modify the cube slightly so it could tell which way up it was held: specifically, they cut out a small piece of each center cubelet’s colorful sticker so as to break what they called its “rotational symmetry.”

OpenAI says the biggest challenge was to create environments in simulation that were diverse enough to capture the physics of the real world, including friction on the fingers, how easy it is to turn the faces on the cube, or what the weight of the cube is, for example.

Techniques in robotics haven’t been able to scale to that complexity that we see in a robotic hand. Humans have evolved to be able to manipulate and operate our hands. So there’s a huge amount of learning that’s happened to get to this place as a species, and the robot has to learn all of this from scratch.

Instead of trying to write every single one of an infinite number of dedicated algorithms to operate the hand in an environment that throws up unpredictable hurdles, OpenAI took a different approach. The team created thousands of simulated environments and learned to do the task in all of them. But given that that you can’t possibly simulate every single complication that might arise when you’re solving tasks in the real, physical world, OpenAI created a new AI training method, called Automatic Domain Randomization (ADR), that endlessly generates progressively more difficult environments in simulation.

This frees us from having an accurate model of the real world, and enables the transfer of neural networks learned in simulation to be applied to the real world.

Every time the hand got good at it outside of the simulation, they threw in more disruptions, in order to make it learn how to eventually be robust at tasks in the real world. Disruptions like, say, putting a rubber glove on the hand. Or nudging it with another hand. Or poking it with a stuffed giraffe. As training progressed, they randomized all the parameters, such as the mass of the cube, the friction of the robot fingers, and the visual surface materials of the hand.

OpenAI researchers found that when trained with ADR, its system turned out “surprisingly robust” to having its task messed with, successfully dealing with situations that they’d never trained it to handle.

The robot can successfully perform most flips and face rotations under all tested perturbations, though not at peak performance.

What’s next?

In speaking with the BBC, Prof. Ken Goldberg, from UC Berkeley, said that OpenAI’s results shouldn’t be overstated, despite what he called its impressive act of “showmanship”.

The average human isn’t particularly good at solving Rubik’s cubes. So when they see a robot doing it, they say, ‘Well, this is better than a human’. But that’s a little deceptive, because games are not reality.

When it comes to robots taking away jobs from people whose innate dexterity enables them to perform complex tasks, Goldberg said that we can relax. That’s likely a few decades off in the future, he said.

We’re far from being able to replace kitchen workers who chop up vegetables, or even pick up and you know, do dishwashing. All those are very complex tasks.

To read more about its work, check out OpenAI’s paper. The BBC notes that the paper wasn’t peer-reviewed, though experts the publication spoke with didn’t dispute its details.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/veD4J8v7FpI/