Showing posts with label Malware. Show all posts
Showing posts with label Malware. Show all posts

Wednesday, July 31, 2019

ZombieLoad Vulnerability: SPARC Solaris Immune

[ ZombieLoad Logo, courtesy ZombieLoadAttack.com ]

ZombieLoad Vulnerability: SPARC Solaris Immune

Abstract:

Computing platforms have long had issues with MalWare, dating back to the MS-DOS days. Windows systems had been targeted, due to their ubiquity as well as the ability to install software with no user interaction into the system using pre-bundled keys. For the most part, UNIX Systems have been immune to most malware. A new classification of malware had become apparent, using CPU vulnerabilities, normally related to the Intel processor (leaving SPARC processors immune.) The latest vulnerability is ZomieLoad, affecting Intel processors and non-UNIX platforms such as Linux and Windows.

What is ZombieLoad

A new family of vulnerabilities on the Intel Processor have become apparent in Mid-May 2019. As an aggregate, they are referred to as "Microarchitectural Data Sampling" or MDS vulnerabilities. ZombieLoad is one of these vulnerabilities. Oracle provided a nice list of CVE's with summary details: CVE-2019-11091, CVE-2018-12126, CVE-2018-12130, and CVE-2018-12127
  • CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
  • CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
  • CVE-2018-12127: Microarchitectural Load Port Data Sampling (MLPDS)
  • CVE-2018-12130: Microarchitectural Fill Buffer Data Sampling (MFBDS)


  • How does it affect SPARC Solaris?

    If you return back t the Oracle provided CVE's above, you will notice the following 2x lines:

    Oracle Hardware

    •Oracle has determined that Oracle SPARC servers are not affected by these MDS vulnerabilities.


    Oracle Operating Systems (… Solaris) and Virtualization:

    •Oracle has determined that Oracle Solaris on SPARC is not affected by these MDS vulnerabilities.


    Conclusions:

    If you are fortunate enough to be running SPARC Solaris, you are immune again. If you are not on SPARC Solaris, but on a less secure Intel based Windows or Linux platform - well, you will be needing to supply your operating system vendor's CPU microarchitecture patch and probably reboot. Let's hope you are not having to roll-your-own fix.

    Wednesday, May 23, 2018

    Spectre - SPARC Solaris: The Safe Choice

    Spectre - SPARC Solaris: The Safe Choice

    Abstract:

    As the industry continues to struggle with Meltdown, a second vulnerability family appeared referred to as Spectre. As of this article publication, there are 4 variants of Spectre, the latter two variants referred to as Spectre-NG. All SPARC systems are safe, if the most recent systems are on the most current firmware & OS releases. As of this publishing, the latest application/OS & firmware patches fixes the first two. The later 2 does not affect SPARC, as the rest of the Intel and other CPU communities are struggling with their cloud and local server infrastructures.

    [Spectre logo, courtesy solaris.wtf]

    Spectre

    Spectre comes in 4 variants, the first 2 and next 2 identified as of the publishing of this article.


    Spectre v1

    Upgrade firefox to 57.0.4 or greater for protection (i.e. bundled in recent Solaris 11.3 updates.

    Unpatched super-scalar CPU's (i.e. SPARC T4, T5, M6, M7, S7, M8, M10, M12) could possibly be exploited by CVE-2017-5753.

    Spectre v2

    A quick summary on Stack Exchange on how Spectre works:
    the attacker tricks the speculative execution to predictively execute instructions erroneously. In a nutshell, the predictor is coerced to predict a specific branch result (if -> true), that results in asking for an out-of-bound memory access that the victim process would not normally have requested, resulting in incorrect speculative execution. Then by the side-channel, retrieves the value of this memory. In this way, memory belonging to the victim process is leaked to the malicious process.
    Unpatched super-scalar CPU's (i.e. SPARC T4, T5, M6, M7, S7, M8, M10, M12) may be exploited by CVE-2017-5715.

    Spectre v3a

    All 64 bit SPARC is immune to CVE-2018-3640 .

    Spectre v4

    All 64 bit SPARC is immune to CVE-2018-3639 .


    [SPARC Logo, courtesy SPARC International]

    SPARC

    Modern 64 bit SPARC variants come in 2 classes: Scalar and Super-Scalar
    [Sun Microsystems Logo, courtesy Sun Microsystems]

    Sun UltraSPARC

    Older Sun UltraSPARC 64 bit Servers do not have the CPU feature which could possibly be exploited and were not vulnerable... they did not issue speculative instructions. Oracle had purchased Sun, so their support channel can provide a definitive explanation. Performance was mostly driven on these servers leveraging SMP chassis, Multi-Core sockets, and large memory footprints.
    [Oracle Logo, courtesy Oracle Corporation]

    Oracle SPARC

    Newer Oracle SPARC Solaris servers are possibly vulnerable, if you are running a modern CPU which initiates speculative instructions (i.e. T4 or newer) while older 64 bit CPU's are not vulnerable. It has been reported on Solaris WTF that "Spectre (CVE-2017-5753 and CVE-2017-5715)" has been fixed in firmware (i.e. T4: 8.9.10 or greater; T5, M5, M6: 9.6.22a or greater; M7, S7, M8: 9.8.5c or greater.)

    The short story, a firmware patch for CPU's newer than T4 are required and the impact is very minor in performance, according to the previous blog. Stock Firefox as shipped with Solaris 10 is vulnerable to Spectre v1, Solaris 11 fixed Firefox vulnerability early 2018, so users should migrate to Solaris 11.

    [Fujitsu Logo, courtesy Fujitsu corporation]

    Fujitsu SPARC


    Sun and Oracle are not the only 2 vendors, who have produced 64 bit SPARC platforms. Newer Fujitsu SPARC Servers are also super-scalar, possibly vulnerable to Spectre v2 (CVE-2017-5753), and have been been fixed in firmware (i.e. M10: XCP2351; M12: XCP3051.)

    Conclusions:

    If you are using an older Sun UltraSPARC server, you are OK. If you are running a newer Oracle SPARC (i.e. T4 or newer) server, you should update Firefox on Solaris 10 or get on the latest Solaris 11 release to be protected from Spectre v1. For the same class of hardware, apply firmware patches available today to protect from Spectre v2. SPARC is immune to Spectre v3 & v4. Get with your Oracle support for the first 2 variants (doc id 2349278.1) and second 2 variants.

    Friday, May 18, 2018

    Meltdown - SPARC Solaris: The Only Safe Choice

    Meltdown - SPARC Solaris: The Only Safe Choice

    Abstract:

    As the rest of the industry has been struggling with security vulnerabilities, SPARC Solaris platforms have been relatively quiet. Meltdown, otherwise known as CVE-2017-5754, has taken the world by storm. Operating Systems have long relied on Memory Management Units to isolate user application programs from the OS kernel. This had come to a screeching halt, leaving lesser secure systems in a world of hurt.

    [Meltdown Logo, courtesy solaris.wtf]

    Meltdown Vulnerability:

    Some OS's will keep the Kernel Pages mapped into the same context as User Application Pages. This is often done for speed (i.e. linux) but places extra dependencies upon the MMU for isolation. Nearly all OS's had ceded this security concern to the CPU vendor, instead of applying the most secure practice in the OS architecture.

    Meltdown:

    As one vendor noted, SPARC Solaris is immune from Meltdown and about the only platform not subject to this critical vulnerability in the data center. This was accomplished by OS designers placing Kernel and User pages into different contexts, a design which added additional security, but at a performance cost that other OS designers in the industry were not willing to cede.

    Conclusion:

    Some Solaris systems, decades ago, may be affected, but nothing modern. Secure by Design is a typical decision for Solaris architects, a decision that has served them well for the decades they served a 64 bit OS to the user community, as other OS vendors played "catch up" in performance or features or functionality.

    Sunday, April 13, 2014

    Security: Heartbleed, Apple, MacOSX, iOS, Linux, and Android


    Abstract:
    Nearly every computing device today is connected together via a network of some kind. These connections open up opportunities or vulnerabilities for exploitation by mafia, criminals, or government espionage via malware. While computers such as MacOSX are immune, along with their mobile devices based upon iOS iPhone and iPads... huge numbers of Linux and Android devices are at risk!





    Heartbleed:

    This particular vulnerability can be leveraged by many sources in order to capture usernames and passwords, where those account credentials can be later used for nefarious purposes. Nefarious includes: command and control to attack commercial, financial, government, or even launch attacks against entire national electrical grids; stealing money; stealing compute resources. The defect is well documented.


    Apple and Android/Linux Vulnerabilities:

    There are many operating systems which are vulnerable to this defect, but for this article, we are only really concerned about the mobile market.
    While most of the buzz surrounding OpenSSL's Heartbleed vulnerability has focussed on websites and other servers, the SANS Institute reminds us that software running on PCs, tablets and more is just as potentially vulnerable.
    Williams said a dodgy server could easily send a message to vulnerable software on phones, laptops, PCs, home routers and other devices, and retrieve up to 64KB of highly sensitive data from the targeted system at a time. It's an attack that would probably yield handy amounts of data if deployed against users of public Wi-Fi hotspots, for example.
    While Google said in a blog post on April 9 that all versions of Android are immune to the flaw, it added that the “limited exception” was one version dubbed 4.1.1, which was released in 2012.
    Security researchers said that version of Android is still used in millions of smartphones and tablets, including popular models made by Samsung Electronics Co., HTC Corp. and other manufacturers. Google statistics show that 34 percent of Android devices use variations of the 4.1 software.

    The company said less than 10 percent of active devices are vulnerable. More than 900 million Android devices have been activated worldwide.
    After taking a few days to check its security, the fruity firm joined other companies in publicly announcing how worried or secure its customers should feel.
    “Apple takes security very seriously. IOS and OS X never incorporated the vulnerable software and key Web-based services were not affected,” an Apple spokesperson said.

    Conclusions:
    To give an adequate understanding regarding the number of mobile Android devices at risk, one could take the population of the United States, at roughly 317 Million people as a baseline. 90 million Android Linux based devices vulnerable, that is equivalent to nearly 28% of the population of the United States is at risk! This is no small number of mobile devices - there is a lot of patching that either needs to be done or mobile devices which should be destroyed. Ensure you check your android device!

    Wednesday, March 26, 2014

    Security: Software Piracy, Android Phones, and SMS Spam



    [Courtesy: Android Authority]
    Security: Software Piracy, Android Phones, and SMS Spam
    Abstract:
    Ever since the creation of computers, people have been distributing software to avoid paying money or paying to distribute something that people don't want. Pirated Applications and Spam are two primary means to distribute viruses, malware, and worms. Baby steps against these on-line monsters are occasionally made.


    In Review: 2013

    From January to November last year, nearly 2 viruses, trojans, or generic malware was discovered each month in the Android mobile application market. December had a couple more discovered. For the malware discovered, there are countless numbers of mobile applications which have not yet been discovered... to steal credit card information, identities, or even "command and control" applications to turn your mobile device into a robot against unsuspecting targets (while you pay for the data traffic that is produced!)

    Starting: 2014

    While consolidating a list of mobile malware in the Android market was not completed, it is clear that there is some progress in this space... no matter how small.

    2014年03月25日 U.S. Government First Convictions Over Pirated Mobile Android Applications
    The US has enforced its first convictions for illegally distributing counterfeit mobile apps, after two Florida men pleaded guilty for their part in a scheme that sold pirated apps with a total retail value of more than 700,000ドル. Thomas Allen Dye, 21, and 26-year-old Nicholas Anthony Narbone both pleaded guilty to the same charge - conspiracy to commit criminal copyright infringement - earlier this month and are due to be sentenced in June and July respectively. Both men were in the Appbucket group, of which Narbone was the leader, which made and sold more than a million copyrighted Android mobile apps through the group's alternative online market.

    2014年03月26日 Chinese Arrest 1,500 in Fake Cellular Tower Text Message Spam Raid
    China’s police have arrested over 1,500 people on suspicion of using fake base stations to send out mobile SMS spam. The current crackdown, began in February, according to Reuters. Citing a Ministry of Public Security missive, the newswire says a group operating in north-east Liaoning province, bordering North Korea, is suspected of pinging out more than 200 million spam texts.

    In Conclusion:
    Be diligent! Remember to purchase your applications from reputable places, don't be seduced into stealing applications on-line or purchasing them under list price. Being a thief could make you a victim!

    Tuesday, March 4, 2014

    Security: Linux, Viruses, Malware, and Worms

    Abstract:
    Not long after the advent of The Internet, the creation of worms, viruses, and other malware had become prevalent. Microsoft based platforms were the original serious target, because of poor security measures. Over time, malware had started to attack Linux based Android mobile phones. Now, the latest attacks appear to be hitting Linux based consumer grade internet routers, which were originally used to help protect Microsoft Windows based platforms in the home. These attacks have spiked in the first two months of 2014.


    [Huawei TP-Link image, courtesy rootatnasro]
    2013年01月11日 - How I saved your a** from the ZynOS (rom-0) attack!! (Full disclosure)
    Hello everyone, I just wanted to discuss some vulnerability I found and exploited for GOODNESS .. just so that SCRIPT KIDIES won’t attack your home/business network .
    Well, in Algeria the main ISP ( Algerie Telecom ) provide you with a router when you pay for an internet plan. So you can conclude that every subscriber is using that router . TD-W8951ND is one of them, I did some ip scanning and I found that every router is using ZYXEL embedded firmware.


    [Linksys Router, courtesy ARS Technica]
    2014年02月14日 - Bizarre attack infects Linksys routers with self-replicating malware
    Linksys is aware of the malware called “The Moon” that has affected select older Linksys E-Series routers and select older Wireless-N access points and routers. The exploit to bypass the admin authentication used by the worm only works when the Remote Management Access feature is enabled. Linksys ships these products with the Remote Management Access feature turned off by default. Customers who have not enabled the Remote Management Access feature are not susceptible to this specific malware. Customers who have enabled the Remote Management Access feature can prevent further vulnerability to their network, by disabling the Remote Management Access feature and rebooting their router to remove the installed malware. Linksys will be working on the affected products with a firmware fix that is planned to be posted on our website in the coming weeks.

    
    [ASUS Warning, courtesy ARS Technica]
    2014年02月17日 - Dear Asus router user: You’ve been pwned, thanks to easily exploited flaw
    "This is an automated message being sent out to everyone effected [sic]," the message, uploaded to his device without any login credentials, read. "Your Asus router (and your documents) can be accessed by anyone in the world with an Internet connection. You need to protect yourself and learn more by reading the following news article: http://nullfluid.com/asusgate.txt."
    ...
    Two weeks ago, a group posted almost 13,000 IP addresses its members said hosted similarly vulnerable Asus routers.


    Conclusions:
    If you are doing any serious internet based work, one might suggest that care is taken to watch the firmware of your consumer grade internet router, and upgrade the firmware as they become available. If you are running a business, a commercial grade router with a managed service may be of special interest. A short PDF on "SOHO Pharming" helps clarify risks. The avoidance of Linux based Android phones or consumer grade Linux routers may be the next best step.

    Friday, January 17, 2014

    Security: Android, Viruses, Malware, and Worms


    [Courtesy AndroidAuthority]

    Android: Malware Infestations for 2013

    2013 Ending
    Rounding out the 2013 Year with More Android Virus and Malware issues.


    Somehow, this is no surprise.

    2013 Investigation
    A previous Network Management article discussing Android Malware from 2013 - not a pleasant place to be. Nearly a new Android exploit was uncovered every 2 weeks.

    2013 Conclusions
    A recent article in The Register mentions the dangers of Java and Android (which is based upon a Java port) on network clients:
    Meanwhile, fully 99 per cent of all mobile malware discovered during the year targeted Android, as did 71 per cent of all web-based attacks on mobile devices.
    Android mobile devices are less expensive than the alternative - but there is clearly a price to be paid.

    Monday, December 30, 2013

    Security: A Linux Server Exploit


    Why do people want to hack your server? Maybe it is to mine BITCOINS!
    http://arstechnica.com/security/2013/12/anatomy-of-a-hack-what-a-successful-exploit-of-a-linux-server-looks-like/
    Like most mainstream operating systems these days, fully patched installations of Linux provide a level of security that requires a fair amount of malicious hacking to overcome. Those assurances can be completely undone by a single unpatched application, as Andre' DiMino has demonstrated when he documented an Ubuntu machine in his lab being converted into a Bitcoin-mining, denial-of-service-spewing, vulnerability-exploiting hostage under the control of attackers.



    Wednesday, December 18, 2013

    Malware: Targeting Linux Platforms


    
    [Screenshot courtesy ARS Technica]
    This is not the first case of such worms, targeting Internet devices, in this case Intel based only.
    http://arstechnica.com/security/2013/11/new-linux-worm-targets-routers-cameras-internet-of-things-devices/
    Researchers have discovered a Linux worm capable of infecting a wide range of home routers, set-top boxes, security cameras, and other consumer devices that are increasingly equipped with an Internet connection. Linux.Darlloz, as the worm has been dubbed, is now classified as a low-level threat, partly because its current version targets only devices that run on CPUs made by Intel

    [Screenshot courtesy Symantec]
    A short article from Security company Symantec discussing the latest WORM targeting The Internet.
    http://www.symantec.com/connect/blogs/linux-worm-targeting-hidden-devices
    Symantec has discovered a new Linux worm that appears to be engineered to target the “Internet of things”. The worm is capable of attacking a range of small, Internet-enabled devices in addition to traditional computers. Variants exist for chip architectures usually found in devices such as home routers, set-top boxes and security cameras. Although no attacks against these devices have been found in the wild, many users may not realize they are at risk, since they are unaware they own devices that run Linux.

    Monday, December 2, 2013

    Android: Viruses, Worms, Trojans, and Malware

    [Courtesy: Android Authority]
    Abstract:
    Sometimes the term "virus" generically, but there are really many kinds of "malware", of which Virus is a specific type. I categorized a few Android malware incidents from 2013 for friends. Please be aware of the "Apps" you buy, what you download, install, and even the web sites you go to.

    A Brief 2013 History:
    The Android ecosystem is not as "tight" as other ecosystems, such as Apple or Blackberry - as such, it is vulnerable to many more exploits... which may cause you money in bandwidth, future purchases, text messages, etc.

    2013年01月09日 --- Android users hit by scareware scam
    http://www.zdnet.com/blog/security/android-users-hit-by-scareware-scam/9960

    2013年01月13日 --- “Bill Shocker” Android malware hits China, infecting 620K smartphone users
    http://e27.co/bill-shocker-android-malware-hits-china-infecting-620k-smartphone-users/

    2013年01月20日 --- New variants of premium rate SMS trojan 'RuFraud' detected in the wild
    http://www.zdnet.com/blog/security/new-variants-of-premium-rate-sms-trojan-rufraud-detected-in-the-wild/10165

    2013年02月08日 --- Researchers spot a fake version of Temple Run on Android's Market
    http://www.zdnet.com/blog/security/researchers-spot-a-fake-version-of-temple-run-on-androids-market/10257

    2013年02月27日 --- Android drive-by download attack via phishing SMS
    http://www.zdnet.com/blog/security/android-drive-by-download-attack-via-phishing-sms/10422

    2013年03月26日 --- First-Known Targeted Malware Attack On Android Phones Steals Contacts And Text Messages
    http://www.forbes.com/sites/parmyolson/2013/03/26/first-known-targeted-malware-attack-on-android-phones-steals-contacts-and-text-messages/

    2013年04月01日 --- Evidence Mounts That Chinese Government Hackers Spread Android Malware
    http://www.forbes.com/sites/andygreenberg/2013/04/01/evidence-mounts-that-chinese-government-hackers-spread-android-malware/

    2013年04月03日 --- Android malware: A new avenue for Chinese hackers
    http://www.citeworld.com/security/21669/android-malware-chinese-hackers

    2013年04月12日 --- Malicious version of Angry Birds Space spotted in the wild
    http://www.zdnet.com/blog/security/malicious-version-of-angry-birds-space-spotted-in-the-wild/11520

    2013年04月18日 --- Warning: Fake Instagram app on Android is malware
    http://www.zdnet.com/blog/security/warning-fake-instagram-app-on-android-is-malware/11597

    2013年04月26日 --- Warning: Fake Biophilla app on Android is malware
    http://www.zdnet.com/blog/security/warning-fake-biophilla-app-on-android-is-malware/11715

    2013年05月02日 --- A first: Hacked sites with Android drive-by download malware
    http://www.zdnet.com/blog/security/a-first-hacked-sites-with-android-drive-by-download-malware/11810

    2013年05月15日 --- Android malware families nearly quadruple from 2011 to 2012
    http://www.zdnet.com/blog/security/android-malware-families-nearly-quadruple-from-2011-to-2012/12171

    2013年05月21日 --- Malware charges users for free Android apps on Google Play
    http://www.zdnet.com/blog/security/malware-charges-users-for-free-android-apps-on-google-play/12245

    2013年07月09日 --- New Android malware infects 100,000 Chinese smartphones
    http://www.zdnet.com/new-android-malware-infects-100000-chinese-smartphones-7000000497/

    2013年08月13日 --- Google messaging service hacked, sends malware to Android users
    http://rt.com/news/google-messaging-hacked-malware-451/

    2013年08月26日 --- Android Malware: 44 Percent Of Android Users Vulnerable To Attacks According To U.S. Government
    http://www.ibtimes.com/android-malware-44-percent-android-users-vulnerable-attacks-according-us-government-1399347

    2013年08月27日 --- Nearly 7,000 Malicious Android Apps Infest China's Appstores
    http://securitywatch.pcmag.com/mobile-security/315218-nearly-7-000-malicious-android-apps-infest-china-s-appstores

    2013年09月12日 --- Email Spam Campaign Spreading Android Malware
    http://threatpost.com/email-spam-campaign-spreading-android-malware

    2013年10月25日 --- New Android Banking Trojan Targeting Korean Users
    http://thehackernews.com/2013/10/new-android-banking-trojan-targeting.html

    2013年11月07日 --- Another zombie 'bogus app' bug shambles out of Android
    http://www.theregister.co.uk/2013/11/07/another_zombie_bogus_app_bug_shambles_out_of_android/

    2013年11月17日 --- New Voicemail Notification - WhatsApp - Malware
    http://techhelplist.com/index.php/spam-list/314-new-voicemail-notification-whatsapp-malware

    2013年12月02日 --- Nexus phones carry SMS crash bug vulnerability
    http://www.theregister.co.uk/2013/12/02/nexus_phones_carry_sms_crash_bug_vuln/

    Monday, December 24, 2012

    Security: 2012 December Update


    Microsoft Windows Security Update Breaks Fonts... Update 2753842 Root Cause...
    Breaking Windows Passwords in under 6 hours...

    New "Dexter" Malware Infects Microsoft Point of Sale Systems to Steal Credit Cards...

    Distributed Denial of Service Attacker Anonymous on the Run...

    The Pakistan Cyber Army Attacks Chinese and Bangladeshi Web Sites...

    ITU: Deep Packet Snooping Standard Leak...

    Democrats and Republicans Unite Against ITU Internet Control...

    Industrial HVAC systems targeted by hackers...

    Microsoft Internet Explorer watching you, even when not open on your screen!

    Android Malware Trojan Taints US Mobiles, Spews 500,000 Texts A Day!

    Baby got .BAT: Old-school malware terrifies Iran with del *.*; dubbed BatchWiper; found 7 months after Flame discovery

    Apple Shifts iTunes to HTTPS, Sidesteps China’s Firewall

    Christopher Chaney, Scarlett Johansson's e-mail hacker, sentenced to 10 years

    Monday, April 16, 2012

    Apple MacOSX Malware: Java Exploit Phase 2


    Apple MacOSX Malware: Java Exploit Phase 2

    Abstract:
    As noted in a previous article, MacOSX experienced a pretty severe malware exploit, through an Oracle Java vulnerability. It appears a second Java exploit targeting Apple Macintosh OSX is current active on the Internet.

    Previous Resolution:
    Apple engaged a Java fix, as well as forcing the shutdown of Java applets, by default. The latter was considered pretty heavy-handed, but considering the second exploit was just revealed, one must wonder whether Apple was aware of this issue looming on the horizon.

    New Java Exploit:
    An writer at securelist.com described the new malware issue.
    This new threat is a custom OS X backdoor, which appears to have
    been designed for use in targeted attacks. After it is activated on an infected
    system, it connects to a remote website in typical C&C fashion to fetch
    instructions. The backdoor contains functionality to make screenshots of the
    user’s current session and execute commands on the infected machine.

    Interesting:
    It appears from the screenshot that there is a Microsoft ASPX involved, in the malware. a Microsoft system seems to be receiving/controlling the malware. Whether this means this is some type of hybrid malware (infecting a Microsoft system) or the malware designer is using Microsoft OS as their virus distribution system is an interesting question.

    Friday, April 13, 2012

    Zero-Day Exploit: WICD under Linux


    This has been a bad week for computing systems.


    • Oracle Java exploit under Apple MacOSX, open and shut case.

    • Microsoft Zero-Day Exploit in nearly all applications, still somewhat open.

    • Adobe Acrobat Reader (Windows, MacOSX and Linux), open and shut case.

    • Now a Linux Security issue, open and shut case.
    WICD Linux Exploit

    As published in the patch description.

    Backtrack 5 R2 (the latest version) allowed the student to overwrite settings to gain a root shell. The flaw was found in wicd (the Wireless
    Interface Connection Daemon)
    What is WICD?

    A network connection manager that aims to simplify wired and wireless networking in Linux.
    If you are a wireless Linux user of WICD, get your patch.

    Wednesday, April 11, 2012

    Windows: Security Issues Again


    Zero-Day Flaw in Windows Apps Since Early 2000's

    Zero-Day Exploit:

    A Zero-Day Exploit means that you turn-on or install software - you are vulnerable. Most PC's shipped applications bundled like MS Office on PC's, right out of the factory. Microsoft posted a security bulletin in April regarding some vulnerabilities.

    Exploit Description:

    The Register writes:

    One of the four critical patches in the batch – MS12-027 – addresses an Active X issue that impacts numerous application and creates a mechanism to drop malware onto vulnerable Windows systems.

    Microsoft warned of attacks in the wild against the zero-day flaw, which affects an unusually wide range of Microsoft products and Microsoft users. Applications affected include Office 2003 through 2010 on Windows; SQL Server 2000 through 2008 R2; BizTalk Server 2002; Commerce Server 2002 through 2009 R2; Visual FoxPro 8; and Visual Basic 6 Runtime.
    And quotes:

    "Attackers have been embedding the exploit for the underlying vulnerability CVE-2012-0158 into an RTF document and enticing the target into opening the file, most commonly by attaching it to an email," Wolfgang Kandek CTO at security services firm Qualys explains. "Another possible vector is through web browsing..."
    Scope:

    Basically, if you have a MS Windows platform with any Microsoft Application (i.e. Works, Office, Internet Explorer, etc.) - you are vulnerable... and Microsoft is warning users that attacks will begin to surge in the next 30 days, while people have not yet patched their system.

    This thing has been around a decade, a facility provided by the OS, and embedded into applications on nearly every Windows based server and/or desktop on the internet. A patch is available now, but another issue recently uncovered will not be fixed until next month.

    By the way, If you are a Windows, Apple, or Linux user - Adobe Acrobat Reader needs some patching, too.

    If you are a Solaris client user, your system should be fine.


    Nightmare Scenario:

    We just discussed several days back about an Apple vulnerability due to a third-party Java exploit. This one is due to a competing Microsoft Technology called "Active-X".

    Welcome to the proverbial nightmare scenario for network managers - every system, everywhere, must be patched immediately, because of OS based issues with nearly every business and consumer application. Don't delay!

    Saturday, April 7, 2012

    Inevitable: Apple MacOSX Infected Via Java on Web


    Inevitable: Apple MacOSX Infected via Java on Web

    Abstract:
    Desktop and Server based systems based upon Microsoft Windows platform have long been the most vulnerable platforms on the internet, providing the most efficient platform for malware writers to steal computing and network cycles from owners around the world. Various other open platforms (i.e. UNIX based systems), which serves much of the internet traffic, have long tried to keep from being infected, by applying more rigorous security rules at the OS level. Apple, being one such vendor who migrated to a UNIX platform, had been successful in keeping their clients secure - but finally a single Java based vulnerability has been discovered (and leveraged) to exploit some systems.

    Virus Buster:
    A virus vendor located in Russia recently published a short research article on a particular threat, which has been closed by Apple.

    Doctor Web—the Russian anti-virus vendor—conducted a research to determine the scale of spreading of Trojan BackDoor.Flashback that infects computers running Mac OS X. Now BackDoor.Flashback botnet encompasses more than 550 000 infected machines, most of which are located in the United States and Canada. This once again refutes claims by some experts that there are no cyber-threats to Mac OS X.
    While very uncommon, MacOSX based Apple Macintosh computers occasionally have third-party based software (i.e. Flash, Java, etc.) which can offer some level of vulnerability to all platforms, including MacOS, Windows, UNIX, etc.

    The Origin:

    The virus research company explains how computers get infected.

    According to some sources, links to more than four million compromised web-pages could be found on a Google SERP at the end of March. In addition, some posts on Apple user forums described cases of infection by BackDoor.Flashback.39 when visiting dlink.com.
    The Morphing:
    Companies started working on a solution, but before Apple released a patch, there was an attempt to diversify the virus, so they might be able to survive once it was closed.

    Attackers began to exploit CVE-2011-3544 and CVE-2008-5353 vulnerabilities to spread malware in February 2012, and after March 16 they switched to another exploit (CVE-2012-0507).
    Security, At Last:
    While this vulnerability has been "in the wild" on the internet for awhile, this particular virus was exterminated.

    The vulnerability has been closed by Apple only on April 3, 2012.
    Protecting Yourself:
    This particular threat is not unique to Apple, but also other systems like Windows. Apple released a security patch, to close this vulnerability - it would be well advised that you regularly download updates from Apple to apply these patches whenever possible.

    A general rule of thumb: STAY AWAY FROM IMMORAL (i.e. pornography) AND ILLEGAL (i.e. copyrighted material like music, videos, software, etc.) DOWNLOADS - NEVER VIEW OR DOWNLOAD SOFTWARE OFF OF THE INTERNET, UNLESS IT IS A WELL KNOWN SITE - NO MATTER WHAT COMPUTER YOU ARE ON... these sites notoriously try to download viruses to your computer!

    Thursday, March 10, 2011

    Security: Taret: Linux Network Devices


    Security: Target: Linux Network Devices Abstract:
    Widespread use of Microsoft operating systems on the desktop and server have been increasingly exploited by malware for dubious uses. The ever growing increased use of Linux on low-end network devices have made an interesting target for malware creators. Most recently, attacks using compromised Microsoft platforms have been targeting low-end Linux network devices.

    History:
    Malware, which cooperates with one another over the internet have been called Botnets. They have taken over Microsoft PC's and Servers, because of their ubiquitousness, across the globe. They can be very difficult to find and destroyed, as demonstrated by the Kneber botnet. First known activity for Kneber dates back to March 2009.

    As the popularity of Linux grew, the movement of malware from Microsoft platforms to Linux platforms began

    In January 2008, a DNS attack on DSL modems was discovered in Mexico. The 2Wire DSL modems were targeted, re-directing people from a Mexico bank to a site falsely demonstrating itself to be a bank.

    In January 2009, the Psyb0t was discovered, targeting MIPS based Linux devices.

    In February 2010, the Chuck Norris Botnet targeted D-Link Linux based devices.

    Sometimes, the network devices are merely used to perform distributed denial of service attacks against corporations or entire nations, as what is happening in South Korea during March 2011.

    These botnets are dangerous and could be used to infiltrate other devices on a network, which are then used to gather information, for the purpose of theft or other illegal nefarious behavior.

    Enter: Elf_Tsunami.R
    In March 2010, a new exploit has been discovered. Elf_Tsunami.R was uncovered by TrandLab. The D-Link DWL-900AP+ is vulnerable, as well as other devices. Formerly exploited Microsoft systems infected with malware can attack and infiltrate the Linux network devices on the local area network.

    Elf_Tsunami.R leverages Internet Relay Check (IRC) servers as an independent transport, after the Linux network device is infiltrated, meaning PC anti-virus software can not completely clean out your network, after cleaning your PC.

    Network Management Connection:
    It has long been expected that Linux would remain more secure to attacks, over Microsoft based appliances, desktops, and servers. Linux consumer based devices, however, are widely available and do not necessarily meet the stringent security requirements for Enterprise and Managed Services networking infrastructure.

    Caution should be taken when employing Microsoft and Linux platforms in an Enterprise and Managed Services networking infrastructure, because of the increased use of hybrid exploits. The possibility of infecting customer networks through their implementation is not out of the question, as demonstrated by millions of globally exploited systems and devices.
    Subscribe to: Comments (Atom)

    AltStyle によって変換されたページ (->オリジナル) /