SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
3rd quarter 2010
MAJOR POSSIBLE THREATS OF 2010: More widespread and more complex
THE SOUND OF DECEPTION
Internet fraud is becoming more ingenious
A NEW ROUND OF CONFRONTATION
How to fight crimeware more effectively
THE DOWNSIDE OF UBIQUITY
What to do about Adobe’s software vulnerabilities
THE EXPERTS
COMMENT
SKELETON KEYS
Modern Day Keylogging Techniques’
CONTENTS
NEWS
Breakthroughs and trends
in the IT security industry 4-7
REPORT
Infosecurity Europe: Catch
up on all the latest
developments from London 8-9
TOP STORY
Skeleton Keys: Everything you
should know about current
keylogging techniques 10-15
ANALYTICS
The Sound of Deception:
Modern Internet fraud 16-19
The Downside of Ubiquity:
Vulnerabilities in
Adobe software 20-23
A New Round of Confrontation:
Fighting crimeware 24-27
TECHNOLOGY
Somewhere Between Black
and White: Whitelisting
technology uncovered 28-31
FORECASTS
More Widespread and More
Complex: Threatscape 2010 32-34
INTERVIEW
Challenging Rootkits: Complex
threats of today and tomorrow
by Vyacheslav Rusakov 36
A WORD FROM THE EDITOR
Dear Readers,
I am very pleased to be able to bring you the
first issue of SECUREVIEW, a magazine dedicated
to all aspects of the IT security industry. We hope
that you will find it interesting and informative and
we look forward to receiving your feedback.
The News section at the beginning of our
magazine will bring you right up to date with all
the latest trends and exciting discoveries in the
field of information security. There will be reports
from recently held conferences and exhibitions,
many of which will set the course for the industry’s
development in the year ahead.
In this issue our Top Story is dedicated to
the important subject of the theft of personal
data using keyloggers, something that will be
of particular interest to representatives of the
corporate sector. In the coming issues we will
be bringing you detailed analyses of the hottest
topics in the industry, reflecting the interests of
users’ right across the board.
In our Analytics column some of the world’s
leading experts and journalists will share the results
of their research into the field of digital safety with
you, examining the burning issues of the day and
providing solutions to those IT security problems so
often encountered by people in the field.
Technological knowhow is very important for
the IT security industry and that is why in every
issue our Technology section will cover the most
interesting solutions from the last few years that
we think have seriously influenced the computer
security market. Then there’s our Forecasts
section, which we are confident will appeal to a
very wide audience.
Finally, for dessert we’ll be putting the industry’s
experts in the hotseat and getting their responses
to some pretty tough computer security related
questions in our Interview section.
We hope that the topics covered in this first
issue of our magazine will appeal to you and most
importantly, if you are working within the industry,
we hope that you will be inspired to share your own
knowledge and experiences with our readers –
we always welcome new authors. You will be
rewarded for your efforts and interesting articles
will definitely be published! Please, contact us at:
editorial@secureviewmag.com, to leave feedback,
submit an article, or tell us what topics you would
like to see covered in the future.
See you next issue!
Alexander Ivanyuk
Editor-in-Chief
Alexander Ivanyuk
SECUREVIEW
SECUREVIEW Magazine
3rd Quarter 2010
Editor-in-Chief: Alexander Ivanyuk
Editor: Darya Skilyazhneva
Design: Svetlana Shatalova,
Roman Mironov
Editorial matters:
editorial@secureviewmag.com
http:// www.secureviewmag.com
Production Assistants:
Rano Kravchenko,
Ryan Naraine
The opinion of the Editor may
not necessarily agree with that
of the author.
NEWS
www.secureviewmag.com4 |SECUREVIEW 3rd
quarter 2010
NEWS
www.secureviewmag.com 3rd
quarter 2010 SECUREVIEW |5
In the world of botnets and denial-
of-service attacks, 2009 was a
very interesting year. The analysts
at Arbor Networks recently looked
back at the data collected by
about 100 of their ISP customers
on DDoS attacks in 2009 and
found that there were more than
20,000 attacks that peaked above
one Gbps of traffic, and nearly
3,000 attacks that hit 10 Gbps.
That’s a lot of traffic, especially
when you consider that “many,
indeed most, enterprises remain
connected to the Internet at 1
Gbps or slower speeds,” as Arbor’s
Danny McPherson points out.
Today, most enterprises and
online properties don’t traditionally
factor DDoS attacks in risk
planning and management related
processes. That is, while they go
to great lengths to periodically
obtain coveted compliance check
marks related to data integrity
and confidentiality, the third pillar,
availability, often takes a backseat.
This is perhaps largely driven
by auditors with fairly static and
quantifiable lists of controls that
can be put in place to contain
risks associated with traditional
vulnerabilities. Unfortunately,
lack of foresight and appropriate
preparation often leaves folks
scurrying about madly when DDoS-
related incidents do occur, as
they’re not considered until you’ve
been hit at least once.
Most reasonably sized organizations
have a comprehensive plan for
dealing with network outages
caused by natural disasters. But
many of them may not know what
to do if they’re targeted by a major
DDoS attack. But, as Arbor’s data
shows, large DDoS attacks are not
the rarity they once were and it’s
probably better to know who’s going
to do what and when before an
attack happens, than afterward.
ENCRYPTION
Pico Computing based in
Seattle, Washington, announced
that it has achieved the highest-
known benchmark speeds for
56-bit DES decryption.
The company reported a
throughput of over 280 billion
keys per second achieved with
the use of a single, hardware-
accelerated server. The FPGA
computing platform assembled
for this demonstration was
based on 11 Pico EX-Series
cards, and fits into a single off-
the-shelf 4U server.
The massively parallel DES
cracking algorithm used brute
force methods to analyze the
entire DES 56-bit key-space. It
iteratively decrypted fixed-size
blocks of data to find keys that
decrypt into ASCII numbers.
This technique is often used for
recovering the keys of encrypted
files containing known types of
data. The candidate keys that
are found in this way can then
be more thoroughly tested to
determine which candidate key
is correct.
The 56-bit Data Encryption
Standard (DES) is now considered
obsolete, having been replaced
by newer and more secure
Advanced Encryption Standard
(AES) encryption methods.
Nonetheless DES continues
to serve an important role in
cryptographic research and in
the development and auditing of
current and future block-based
encryption algorithms.
Source: www.picocomputing.com
Source: http://arxiv.org/ftp/arxiv/papers/1002/1002.4530.pdf
Scientists from South Korea,
the USA and India have invented
a novel scheme for securing
the transfer of data across
computer networks.
The typical security method
for preventing data from falling
into the wrong hands is by the
use of encryption. However, the
cost of implementing encryption
on a network is high due to its
computational complexity.
The essence of the proposed
scheme is to break the data
to be transferred into many
smaller parts. When put back
together, these parts become
the original piece of data again,
but only if they are reassembled
in a particular way, just like
a jigsaw puzzle. The correct
method for reassembling the
pieces is known only to the
recipient for whom the data
is intended. Any unauthorized
entity that intercepts the
message fragments will not
have sufficient information
to correctly reassemble the
component parts of the
communication and thus will not
be able to read the message.
Cracking 56-bit DES
Jigsaw Puzzles
CODING
Source: http://cwe.mitre.org/top25/
The ‘Common Weakness
Enumeration’ initiative from the
non-profit MITRE Corporation
includes its 2010 list of
the 25 most dangerous
programming errors.
The list is compiled by more
than 50 experts from such
respected IT-organizations as
The SANS Institute, RSA,
Red Hat, Sun, Microsoft
and others.
The most critical programming
errors that can lead to serious
software vulnerabilities are
arranged in the list according
to their importance. All noted
flaws are dangerous because
they frequently allow attackers
to completely take over the
software, steal data, or prevent
the software from working.
Cross-site scripting (XSS), SQL
injection, and Buffer overflow
are considered to be the most
hazardous of all the listed errors.
The rating also contains
detailed technical descriptions
of the flaws, code examples
and related attack patterns, as
well as their methods of error
prevention and mitigation.
The 25 Most Dangerous
Programming Errors
Table 1.
‘SANS/MITRE’s Top 25 Most Dangerous Programming Errors’
1 Failure to preserve web page structure (‘Cross-site Scripting’)
2
Improper sanitization of special elements used in an SQL command
(‘SQL Injection’)
3 Buffer copy without checking size of input (‘Classic Buffer Overflow’)
4 Cross-site request forgery (CSRF)
5 Improper access control (Authorization)
6 Reliance on untrusted inputs in a security decision
7
Improper limitation of a pathname to a restricted directory (‘Path
Traversal’)
8 Unrestricted upload of file with dangerous type
9
Improper sanitization of special elements used in an OS command
(‘OS Command Injection’)
10 Missing encryption of sensitive data
11 Use of hard-coded credentials
12 Buffer access with incorrect length value
13
Improper control of filename for include/require statement in PHP
program (‘PHP File Inclusion’)
14 Improper validation of array index
15 Improper check for unusual or exceptional conditions
16 Information exposure through an error message
17 Integer overflow or wraparound
18 Incorrect calculation of buffer size
19 Missing authentication for critical function
20 Download of code without integrity check
21 Incorrect permission assignment for critical resource
22 Allocation of resources without limits or throttling
23 URL redirection to untrusted site (‘Open Redirect’)
24 Use of a broken or risky cryptographic algorithm
25 Race condition
Large DDoS Attacks Still a Serious Problem
Israeli scientists from
the Ben-Gurion University
reviewed the security system
of the prospective Android
software framework from
Google. The researchers
defined the main threats, high-
risk vulnerabilities, existing
protection tools and relevant
security solutions.
The incorporation of integrated
Internet services on mobile
devices increases their
exposure to damage inflicted
by various types of malware.
The risk is amplified by the fact
that as a smartphone, Android
devices are expected to handle
personal data and provide PC-
compliant functionality, thereby
exposing the user to all the
attacks that threaten users of
personal computers.
Google Android is a
comprehensive piece
of software for mobile
communication devices. The
Android framework includes an
operating system, middleware
and a set of key applications.
The review indicates that the
security mechanisms embedded
in Android address a broad
range of security threats.
Google has implemented the
Portable Operating System
Interface (POSIX) which gives
each application a user ID, this
prevents different applications
from affecting each other.
Setting each application as a
different user prevents one
application from accessing
files and signals from another
and distributes the selected
kernel’s CPU consumption
evenly by default. Additional
security features are provided
through the permission-granting
mechanism that enforces
restrictions on the specific
operations that a particular
application can perform.
Signing applications is another
significant security feature.
The authors also looked
at what additional security
mechanisms could be applied
on Android-based handsets,
such as porting SELinux into
Android and activating a security
policy, enabling a net-filter-
based firewall and an Intrusion
Detection System based on
anomaly detection (termed
Andromaly), etc.
Despite these measures,
scientist identified five high-risk
threats that need attention.
The main security issue that
they raised is the fact that
Android is an open-source
platform whose source code
was published after the first
Android-powered devices were
released onto the market.
This increased the chance of
revealing vulnerabilities in low-
level components (such as in
the Linux kernel, core libraries
or the Dalvik virtual machine).
Moreover, several vulnerabilities
were identified in the Android
permission mechanism which
greatly increases the risk of
malware infection.
The researchers proposed
several security mechanisms
that can mitigate these high-
risk threats.
It is highly important to
incorporate a mechanism,
such as the SELinux access
control system, that can
prevent potential damage
resulting from an attack on
the Linux kernel layer. Also,
better protection should be
added for strengthening the
Android permission mechanism
and for detecting the misuse
of granted permissions. The
authors subsequently gave
highest priority to such things
as the SELinux tools, a firewall,
Intrusion Detection System,
Automated Static Analysis
and Code Verification and the
Context Aware Access Control
solutions. They placed Data
Encryption and the Selective
Android Permission systems
lower down the list
of priorities.
Source: http://arxiv.org/ftp/arxiv/papers/0912/0912.5101.pdf
Unsecured Android
MOBILE SECURITY
Dennis Fisher is
Technology Evangelist
for Kaspersky Lab’s
US Office.
Source: http://threatpost.com/en_us/blogs/large-ddos-attacks-still-serious-problem-011110
THREATS	 THE EXPERTS COMMENT
NEWS
www.secureviewmag.com6 |SECUREVIEW 3rd
quarter 2010
NEWS
www.secureviewmag.com 3rd
quarter 2010 SECUREVIEW |7
An international group of
scientists has demonstrated
the possibility of stripping away
the anonymity from significant
numbers of users of popular
social networking sites.
Any technology allowing the
identification of users of social
networking sites, the collection
of data about their habits and
the prediction of their behavior
can be used to cause harm. For
example, such data can reveal
a user’s sexual habits, or render
somebody open to blackmail. But
despite the fact that this threat is
well known, very little has been
done to prevent it.
The researchers demonstrated
the possibility of this type of
attack by identifying a user who
was simply browsing the web. An
attacker can probe the victim’s
browser history for any URLs
that may reveal membership of
any social networking groups.
By combining this information
with previously collected data it
is possible to identify any user of
a social network who happens
to visit the attacker’s website.
In many cases, this allows the
attacker running the malicious
website to uniquely identify his
visitors by the names which they
use in their corresponding social
networking profiles.
This type of attack requires very
little effort to carry out and has the
potential to affect many millions of
registered social networking users
who have group memberships.
The non-profit Cloud Security
Alliance has published a report
defining the foremost cloud
security threats.
Cloud computing is a kind of
distributed system whereby all
computer resources are provided
to the users in the form of Internet
services. As the technology
becomes more and more popular,
criminals use it to improve their
reach, avoid detection and
increase the effectiveness of their
activities. Enterprise and home
users need to better understand
the risks associated with the
adoption of cloud computing.
The authors of the report
identified the following
seven threats:
1. Abuse and nefarious
use of cloud computing
Providers of infrastructure as a
service offer their customers the
illusion of unlimited compute,
network and storage capacity,
often coupled with a frictionless
registration process where
anyone with a valid credit card
can register and immediately
begin using cloud services.
Some providers even offer free
limited trial periods. By abusing
the relative anonymity behind
these registration and usage
models, spammers, malicious
code authors and other criminals
have been able to conduct their
activities with relative impunity.
2. Insecure Application
Programming Interfaces
Cloud computing providers
expose a set of APIs that
customers use to manage and
interact with cloud services.
Provisioning, management,
orchestration and monitoring
are all performed using these
interfaces. The security and
availability of general cloud
services is dependent upon the
security of these basic APIs.
3.Malicious insiders
This threat is amplified for
consumers of cloud services
by the convergence of IT
services and customers under
a single management domain,
combined with a general lack
of transparency into provider
process and procedure.
4. Shared technology
vulnerabilities
Cloud computing vendors deliver
their services in a scalable way
by sharing infrastructure. Often,
the underlying components
that make up this infrastructure
were not designed to offer
strong isolation properties for
a multi-tenant architecture. To
address this gap, a virtualization
hypervisor mediates access
between guest operating systems
and the physical compute
resources. Still, even hypervisors
have exhibited flaws that have
enabled guest operating systems
to gain inappropriate levels
of control or influence on the
underlying platform.
5. Data loss/leakage
The threat of data compromise
increases in the cloud.
Examples include insufficient
authentication, authorization or
audit controls, operational failures
and data center reliability.
6. Account, service
& traffic hijacking
Cloud solutions add a new
threat to the landscape. If an
attacker gains access to your
credentials in the cloud, they can
manipulate data, eavesdrop on
your activities and transactions,
return falsified information
and redirect your clients to
illegitimate sites. Your account or
service instances may become
a new base for the attacker.
From here, they may leverage
the power of your reputation to
launch subsequent attacks
7. Unknown risk profile
One of the ideas of Cloud
Computing is the reduction
of hardware and software
ownership and maintenance
to allow companies to focus on
their core business. This has
clear financial and operational
benefits, which must be
weighed carefully against the
contradictory security concerns —
complicated by the fact that
cloud deployments are driven by
groups who may lose track of the
security ramifications.
As the authors stressed, the
threats described are not listed
in order of severity.
Dangerous Clouds
SECURITY THREATS
Risky Communication
SOCIAL NETWORKING
Source: http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
Over the last few months there
have been quite a few news
reports about Banker Trojans
emptying the online bank
accounts of small businesses
in the U.S.
The MitE Banker Trojans
reached its peak of ‘maximum
sophistication’ back in 2007.
This specific subset of Banker
Trojans was - and still is - extremely
sophisticated and will exploit
bank-specific vulnerabilities in the
implementation of two-
factor authentication.
A lot of banks still don’t employ
two-factor authentication for
making transactions. Or, when
they do, it’s a very weak form of
two-factor authentication.
Secure online banking requires
multi-factor authentication. The
authentication code needs to be
received or generated on a device
which is not connected to the
device that’s doing the transaction.
Ideally, not only should the
transaction authorization code
be generated dynamically, but
also the password for logging
onto the banking site. One thing
to bear in mind here is that the
cryptographic response algorithm
needs to be different for logging
on and approving transactions.
The solution to this huge problem
is actually quite simple. Make the
receiving bank account number
a part of the authentication
process. Either send the
number by SMS, or use it as an
(additional) challenge when using
a token. The user knows where
the money is supposed to go.
What we also need to bear in
mind is that since 2006/2007,
a lot has changed. The average
piece of malware has become
a lot more sophisticated. Form
grabbers, for example, are pretty
much standard. In fact, we
live in an age where Microsoft
decided to pull a patch because
of problems which turned out
to be caused by the extremely
advanced TDSS rootkit.
This means that we need online
systems in place that are resilient
to such powerful malware.
The state of online banking in
some ways resembles that of
the Internet. For many banks,
online banking was not directly
designed with proper safety in
mind. Convenience is the major
driver. The Internet was built on
very much the same principles.
I’d argue that solving the online
banking problem is an infinitely
easier task than fixing the
fundamental weaknesses in the
infrastructure of the Internet.
Here’s How to Fix Online Banking Fraud
Roel Schouwenberg
is a Senior Antivirus
Researcher for
Kaspersky Lab’s
Global Research &
Analysis Team.
Source: http://threatpost.com/en_us/blogs/heres-how-fix-online-banking-fraud-022510
ONLINE THREATS	 THE EXPERTS COMMENT
According to estimates by Team
Cymru Research, the number
of botnets controlled by http-
channels has doubled during the
past half year.
American researchers
associate that tendency with the
widespread availability of ready-
made kits for cyber-attacks.
Additionally, the very user-friendly
interfaces play a significant role
in allowing those without and any
specialist skills and knowledge to
operate http-botnets.
According to the results of
their research, the number of
botnets exploiting IRC-traffic
remains unchanged. Most of their
command and control centers
are situated in the USA and
Western Europe. The USA aside,
many http-botnet owners take
advantage of hosting-services
provided by the BRIC countries
(except India). They are apparently
attracted by the fact that the
financial situation and rapidly-
growing economic development
in China, Russia, and Brazil
means that those governments
cannot make sufficient resources
available for fighting cybercrime.
Source: http://www.team-cymru.org/ReadingRoom/Whitepapers/2010/
developing-botnets.pdf
Transition to http
In an undercover mission to
learn more about the size and
scope of the son of the infamous
Storm botnet, Waledac, German
researchers have discovered the
spamming botnet is much larger
and more efficient than
previously thought.
The team from the Universities
of Mannheim and Vienna boldly
infiltrated the Waledac botnet
from 6 Aug to 1 Sept of last
year using a cloned Waledac
bot that they built and code-
named “Walowdac.” They found
Waledac runs a minimum of
55,000 bots a day, with a total
of 390,000 bots - much larger
than the previous estimates of
20,000 or so bots.
The researchers were also able
to measure the success rates
of various spam campaigns
launched by Waledac, and
were able to observe up-close
Waledac’s newer features, such
as its ability to steal credentials
from bot-infected machines.
The German researchers
calculated from their research
that Waledac could theoretically
send more than 1.5 billion spam
messages per day, and that’s
actually a conservative estimate,
they said in their report (PDF) on
the experiment.
Waledac changes its malware
variants approximately every two
weeks the researchers observed,
and the U.S. is home to the majority
ofthebotsandrepeaters,with 17.34
percent of the spamming bots and
19.5 percent of the repeaters. It
was also discovered that around
90 percent of the Waledac bots
were 32-bit XP machines.
BOTNETS
Source: http://www.darkreading.com/security/vulnerabilities/showArticle.
jhtml?articleID=222200371
Child of Storm Botnet
‘Waledac’ Is Expansive
Source: http://www.iseclab.org/papers/sonda-TR.pdf
NEWS
www.secureviewmag.com8 |SECUREVIEW 3rd
quarter 2010
NEWS
www.secureviewmag.com 3rd
quarter 2010 SECUREVIEW |9
Have you ever found a false
positive when uploading a file
to a website like VirusTotal?
Sometimes it happens that not
just one scanner detects the
file, but several. This leads to an
absurd situation where every
product which doesn’t detect this
file automatically looks bad to
users who don’t understand that
it’s just false positives.
Sadly you will find the same
situation in a lot of AV tests,
especially in static on-demand
tests where sometimes hundreds
of thousands of samples are
scanned. Naturally, validating
such a huge number of samples
requires a lot of resources. That’s
why most testers can only verify a
subset of the files they use.
Since good test results are a key
factor for AV companies, this has
led to the rise of multi-scanner
based detection. Naturally AV
vendors, including Kaspersky Lab,
have been scanning suspicious
files with each others’ scanners
for years now. Obviously knowing
what verdicts are produced by
other AV vendors is useful.
This is why a German computer
magazine conducted an
experiment along these lines,
and the results of this experiment
were presented at a security
conference last October. The
experimenters created a clean file,
asked us to add a false detection
for it and finally uploaded it to
VirusTotal. Some months later this
file was detected by more than
20 scanners on VirusTotal. After
the presentation, representatives
from several AV vendors at the
event agreed that a solution
needed to be found. However,
multi-scanner based detection is
just the symptom not the cause -
the root of the problem is the test
methodology itself.
Improving test methodologies
was also the reasons why
two years ago a number of AV
companies (including Kaspersky
Lab), independent researchers
and testers founded AMTSO
(Anti-Malware Testing Standards
Organization). We decided to
illustrate the problem during our
recent press tour in Moscow
where we welcomed journalists
from all around the world.
Naturally the goal was to highlight
the negative effect of cheap,
static on-demand tests.
What we did pretty much
replicated what the German
computer magazine did last year,
only with more samples. We
created 20 clean files and added a
fake detection to 10 of them. Over
the next few days we re-uploaded
all twenty files to VirusTotal to see
what would happen. After ten days,
all of our modified (but not actually
malicious) files were detected by
up to 14 other AV companies - in
some cases false detection was
probably the result of aggressive
heuristics, but multi-scanning
obviously influenced some of the
results. We handed out all the
samples used to the journalists
so that they could test it
for themselves.
So where should we go
from here? The good news is
that in the last few months,
some testers have already
started to work on new testing
methodologies. Instead of static
on-demand scanning they try to
test the whole chain of detection
components: anti-spam-module
-> in the cloud protection ->
signature based detection ->
emulation -> behavior-based real-
time analysis, etc. Ultimately of
course, it’s up to the magazines
to apply this type of test and to
abandon approaches that are
simply outdated and outmoded.
If we get rid of static on-
demand tests with their mass of
invalidated samples, the copying
of classifications will at least be
significantly reduced, test results
will correspond more closely to
reality (even if that means saying
good bye to 99.x% detection
rates) and in the end everyone
will benefit: the press, the users
and of course us as well.
MALWARE TESTING	 THE EXPERTS COMMENT
According to a poll by Sophos,
the amount of spam and harmful
messages on social networks
has increased by 70% during the
last 12 months.
By the end of the year more than
five hundred organizations had
taken part in the poll. Some 57%
of corporate users said that they
had received spam whilst visiting
social networking sites, 36%
reported harmful programs and
30% suffered phishing attacks.
Of the participants polled,
72% expressed awareness
that the irresponsible use of
social networks by employees
could pose a significant risk to
corporate security, with 60%
of the criticism being directed
towards Facebook. It is clear that
of all of the social networking
websites available in the west,
Facebook has the largest
number of members. According
to Sophos, most of the social
networking providers are much
more interested in increasing
their market share than they ever
are in the question of protecting
their users from cybercrime.
It seems paradoxical then that
half of the respondents (13%
more than last year) allow their
personnel to visit Facebook from
their place of work without the
imposition of any restrictions.
Experts continue to mention
that although LinkedIn (A social
network allowing users to seek
out useful business contacts) is
not believed to be a direct danger
to corporate business, personal
information published on that
server may be of a great value to
the cybercriminals. It is because
it is used mostly by professionals
that LinkedIn could easily
become some sort of directory of
companies’ personnel resources
which may provide information
for targeted cyber-attacks.
On the Way to Better Testing
The Expansion of Internet Dangers
Source: http://www.sophos.com/pressoffice/news/articles/2010/02/
security-report-2010.html
SOCIAL NETWORKSSECURITY THREATS
The shorter and more
simplistic a password is, the
more susceptible it will be to
basic, brute force password
attacks. This in turn leaves
the users’ data vulnerable and
hackers are rapidly adopting ever
more smart brute force password
cracking techniques. Despite
this however, users continue to
choose very weak passwords.
The Imperva Application
Defense Center has analyzed the
strength of many user passwords.
The results of the investigation
have been published in their
‘Consumer Password Worst
Practices’ report.
The key findings
of the report are:
•	About 30% of users chose
weak passwords the length
of which was equal to, or
below, six characters
•	Almost 60% of users chose their
passwords from a limited range
of alpha-numeric characters
•	Nearly 50% of users chose
names, slang words, everyday
words or passwords using such
easily-guessed constructions
as consecutive digits and
adjacent keyboard keys, for
example’123456’, ‘12345’,
‘123456789’ and ‘Password’.
It is recommended that users:
1. Choose a strong password
for sites that store personal
information that they value
highly. Bruce Schneier’s advice
is useful. He says: “Take a
sentence and turn it into a
password. Something like “This
little piggy went to market”
might become “tlpWENT2m”.
That nine-character password
won’t be in anyone’s dictionary.
2. Use a different password
for each site – even for the ones
where privacy isn’t an issue. To
help remember the passwords,
again, following Bruce Schneier’s
advice is recommended: “If you
can’t remember your passwords,
write them down and put the
paper in your wallet. But just
write the sentence – or better
still – a hint that will help you to
remember your sentence”.
3. Never trust a third party
with your important passwords
(webmail, banking, medical etc.).
It is recommended that
administrators should:
1. Enforce a strong password
policy – if you give the users a
choice, it is very likely that they
will choose weak passwords.
2. Make sure passwords are not
transmitted in clear text. Always
use https for logins. Make sure
passwords are not stored in clear
text. Always encrypt passwords
before storing them in a database.
3. Employ aggressive, anti-
brute force mechanisms to detect
and mitigate brute force attacks
on login credentials. It makes
brute force attacks too prolonged
to serve any practical purpose,
even against shorter passwords.
You should actively put obstacles
in the way of a brute-force
attacker – such as CAPTCHAs and
computational challenges, etc.
4. Employ a password change
policy. Trigger the policy either
according to a predetermined
schedule, or immediately when
suspicion of a compromise arises.
5. Allow and encourage
passphrases instead of passwords.
Although sentences may be longer,
they may be easier to remember.
With added characters, they
become more difficult to break.
Very Weak Passwords
are Still Very Popular
Source: http://www.imperva.com/docs/WP_Consumer_Password_Worst_
Practices.pdf
The French government has
suggested an initiative to
replace all user passwords with
a single digital certificate that
provides access to all of the
nation’s web services.
According to the project’s
authors, the introduction
of a universal identifier or
‘IdeNum’ as it would be
known, could put an end to
the tiresome necessity of
memorizing a huge number
of difficult alpha-numeric and
symbol combinations that are
supposed to provide security
when surfing the web. According
to statistics provided by
Trusteer, 73% of those polled
admitted that they use their
bank passwords for entering
other online services as well.
The integration of an IdeNum
system would make the
authorization process shorter
for users of any private or
public resources participating
in the scheme and would
also automate the process of
completing online forms. The
multi-functional identifier could
be kept on a separate device,
which may be a flash, smart,
or SIM-card.
At present, more than 20
national institutes including
The Union of French bankers,
The Association of Insurance
Companies and the French
postal service have all expressed
their readiness to take part in
the research. A prototype of the
authentication system is planned
to be unveiled by the middle
of this year, followed by the
introduction of a fully-functional
system in 2011. The lifespan of a
digital certificate will probably be
limited to between 3 and 5 years.
There is no doubt that the
realization of such a difficult
project will take a lot of
resources and financing.
This is in large part due to
the fact that the system of
authentication must not only
certify the users’ identity, but
must also ensure that data
security is maintained as well.
That last issue becomes more
and more relevant due to the
appearance of banking Trojans.
These are able to intercept
transactions in real-time and
change the information therein
without being noticed by any
of the participants. Protecting
digital certificates from theft
is a serious challenge. That
“Key to the Kingdom” will surely
become the ultimate prize for
those whose hunting domain is
the Internet and whose prey is
the funds of the unwary.
DIGITAL CERTIFICATES
Source: http://countermeasures.trendmicro.eu/french-government-to-bid-
adieu-to-online-passwords/
Farewell to a Thousand-and-
One Passwords?
Magnus Kalkuhl is a
Senior Virus Analyst
for Kaspersky Lab’s
Global Research &
Analysis Team
Source: http://threatpost.com/en_us/blogs/way-better-malware-testing-020110
REPORT | Infosecurity Europe 2010
www.secureviewmag.com10 |SECUREVIEW 3rd
quarter 2010
Infosecurity Europe 2010 | REPORT
www.secureviewmag.com 3rd
quarter 2010 SECUREVIEW |11
Nigel Stanley, Practice Leader of IT Security
at Bloor Research said, “As an analyst I
feel that Infosecurity Europe is the most
important event of the year. It’s here that
you meet with the manufacturers and get
to know about all the latest industry trends.
For me, it is certainly time well spent.” That
the event draws such large numbers of
visitors and manufacturers is due to both
the professionalism of Claire Sellick, Event
Director for Infosecurity Europe, and the
greatly increased threat levels existing in
the field of IT security these days. After
several years of relative stagnation, British
firms are now facing a punishing new wave
of cyberattacks, the impact of which is
estimated to be in excess of £10 billion
[Sterling] per year. “This raises awareness of
IT security management quite considerably,”
Sellick is convinced.
OPENING KEYNOTE
TARGETS DATA LOSS
In his keynote address, David Smith,
Deputy Commissioner for the Information
Commissioner’s Office (ICO) painted the
following picture: “In little more than two
years, 960 instances of data loss were
recorded, that averages out to about 30
per month,” said Smith. According to his
information, the UK’s National Health
Service (NHS) alone accounted for about
30 percent of the total. He believes that
“It is very probable that in the nearest
future it will be a legal requirement in the
United Kingdom to notify the authorities
of any data losses” Even a study by
Pricewaterhouse Coopers had little to
report that offered any hope. A worrying
92 percent of all large enterprises
suffered a security incident or data
loss last year. The study, ‘A Survey of
Information Security Breaches’ found
that cybercriminals were themselves
becoming increasingly organized along
traditional business lines and this is
driving a demand from industry for
adequate means of protection. However,
many enterprises remain woefully
unprepared or only partially ready to
meet the incumbent threat.
For many visitors to Info Security
2010, the workshops on offer were the
real highlight. The organizers divided
the event into three sections: keynotes,
business strategy and technology. The
business strategy presentations earned
consistent praise. With their limited
duration of 45 minutes they were ideally
suited to visitors who wanted to grab as
much information as possible in a short
space of time. The audience very much
appreciated the fact that the sessions
were not usurped for the purposes
of marketing and sales. Ian Mann’s
talk on Social Engineering came in for
particularly high praise. The author of
‘Hacking the Human’ provided several
amusing anecdotes in which he explained
why the human animal sitting in front of
the screen is the biggest security risk for
most companies.
EUGENE KASPERSKY
ENTERS THE IT HALL
OF FAME
Much applause was also heaped upon
the keynote ‘Cyber Warfare - War Stories
from the Front Lines’. The long queues
outside the entrance were a surefire
indication that something special was
about to take place there. What the two
speakers, Marc Kirby and Sean Hanna,
subsequently delivered was probably
the most entertaining and exciting event
of Infosecurity Europe 2010. Eugene
Kaspersky, CEO of Kaspersky Labs also
took to the stage to share his vision of
what the future might hold in terms of
IT technologies. According to Eugene, in
the future the smartphone will be king,
with everybody owning and using one.
Kaspersky, who during Infosec 2010 was
inducted into the Hall of Fame, stated
emphatically that the world will see an
explosion in the development of hardware
and software for smartphones. “I believe
that in the nearest future, smartphones
will have enough memory and computing
power to hold all our personal data, as well
as movies, pictures and other information.”
He stated. “There will be no reason to use a
computer any more. Why would you? All you
need is a keyboard, a screen and a network
connection.” Such a revolution would
increase the attacks on mobile devices
considerably. However, these are far easier
to protect against due to the centralized
nature of the providers’ infrastructure.
As evidenced by the continuing
increase in visitor and exhibitor numbers,
Infosecurity Europe is very much on the
right track. Claire Sellick sees the growing
success of the event as being due to
companies realizing that IT security is
now as essential prerequisite for new and
profitable products and services. Events
like this that bring together suppliers and
customers so that each may appreciate the
wishes and expectations of the other will no
doubt shape the future of the IT industry.
Sellick stated that 82 percent of the stands
available for Infosecurity Europe 2011 have
already been booked. RE
CONCEPT: EXHIBITION
AND LECTURES
As they have in previous years, the organizers
of Infosecurity 2010 pursued a two-tier approach.
The central exhibition hall was the venue for the
exhibiting companies, with booths designed to
allow visitors and company representatives to
hold discussions away from all the hustle and
bustle. Both sides, exhibitors and visitors, rated
the layout very highly. Nina Malchus, Director of
Publishing for SecuMedia and a regular at the
event gave her impression of the exhibition hall:
“The hall is very busy and makes a big impression
on the visitor. There is an awful lot to see,
observe and experience, but it’s possible to get
round everything in a good day.”
David Tomlinson, Managing Director of Data
Encryption Systems was similarly impressed. “Our
booth was visited by many visitors who were very
keen to do business. The event is an ideal place to
meet new clients.” Analysts confirm that impression.
There was no mistaking the result of this
particular match: Infosecurity Europe 1 - Ash
cloud 0! Despite all the disruption to the airspace
over Europe, the UK’s most important security
event, now in its 15th year, drew in a record
number of exhibitors and visitors. Over 12,500
eager attendees turned up to take advantage
of what was on offer from the event’s 324
exhibitors. Many of the visitors were drawn by
the quantity of very well-known and respected
speakers delivering the keynote speeches and
holding workshops, not to mention the fact that
a number of companies chose the event to make
some pretty major announcements. Among them
were Symantec who announced the purchase
of encryption company PGP and GuardianEdge
for a cool $370 million [US]. Two lectures in
particular garnered a great deal of attention:
Pricewaterhouse Coopers (PwC) announced the
results of their study on data loss, whilst David
Smith, Deputy Commissioner for the Information
Commissioner’s Office (ICO), announced tougher
penalties for the loss of customer data.
Security defies the ash clouds
The Infosecurity Europe 2010 event attracted a huge number of visitors
despite the chaos to European airspace caused by the eruption of the
Icelandic volcano. This year the focus was on data loss, Cloud Security
and Web 2.0. There were very many popular exhibition stands at this
year’s event, but the thing that really seemed to pull in the crowds were
the various workshops and presentations that covered everything from
the latest industry technologies through to business strategy.
Elmar Török has been
working in the IT-Industry
since 1989. He became
an author and technical
journalist in 1993 while
studying electrical
engineering in Munich
and Kempten. Since then
he has written hundreds
of articles for just about
every major computer and
networking publication
in Germany. Elmar
specialises in IT-Security
and storage issues,
has a solid knowledge
of server-related topics
and knows his way
around virtualization.
He is the Editor-in-
Chief of the security
periodical “Infodienst
IT-Grundschutz” and
is involved in the final
acceptance process of
new material for the IT-
Grundschutz Catalogues
of the Federal Office for
Information Security.
Article by
Elmar Török
Earls Court: The Place to be for Infosecurity Europe 2010 Where Products and News Abound: Companies present their wares in the exhibition hall
David Smith, Deputy Commissioner for the Information
Commissioner’s Office during his keynote
TOP STORY | Keyloggers
www.secureviewmag.com12 |SECUREVIEW 3rd
quarter 2010
Keyloggers | TOP STORY
www.secureviewmag.com 3rd
quarter 2010 SECUREVIEW |13
□	A keylogger can be an espionage
device when installed onto a rival’s
system by a competitor.
•	 Keyloggers can be used by private
detective agencies, special services
and criminal organizations as a means
of spying on users.
•	Keyloggers can be part of a malware
program and can be used for the
detection of passwords, credit card
numbers and other such important
information. This type of keylogger can
operate automatically, becoming active
only when certain application windows
or websites are open.
When a keylogger is employed by a
cybercriminal it becomes a very significant
threat to the user, as most importantly, it
allows the acquisition of a user’s passwords
which then provide unauthorized access
to the user’s email, social networking and
online bank accounts.
THE LIFECYCLE OF
A KEYLOGGER
Just as with any spyware, the lifecycle of
a keylogger consists of three main stages:
1.	System penetration. This operation
can be performed manually and it is
typical for the majority of commercial
keyloggers. To do this the cybercriminal
needs remote or local access to
the PC. The second variant is the
installation of a keylogger with the help
of programs such as Trojan-Dropper and
Trojan-Downloader. It is very common
knowledge that a lot of Trojan samples
contain keylogger functionality built in for
the purposes of spying on users, usually
for the harvesting of passwords or credit
card numbers.
2.	Spying on users. During this process it
is very important for the keylogger to
remain undetected, and several methods
exist to achieve this.
3.	Passing the collected data to the
cybercriminal. This process is greatly
simplified where the criminal has access
to the target PC. When access does not
exist, commercial keyloggers offer a rich
choice of possibilities. Data can be sent
via email, passed over a network, or
downloaded from an FTP server.
SOFTWARE
KEYLOGGERS
The general modus operandi of a
keylogging program is that it is loaded
onto a PC where it resides quietly and
monitors keyboard inputs, whilst at
the same time performing a range of
accompanying tasks such as avoiding
detection and passing on any collected
protocols and data etc. There are a large
number of free commercial keyloggers
available, as well as specialized catalogue
sites containing the results of keylogger
tests and their descriptions. A perfect
example of such a resource can be found
at: http://www.keylogger.org
Keyloggers that
operate according to the
interrogation cycle principle
This type of keylogger is the simplest
of all and is based on the system of
assigning a number of API-functions to
the applications for interrogating the
keys on the keyboard. For example,
the GetAsyncKeyState function shows
whether the named key is pressed or
released, and GetKeyboardState returns
an array of 256 elements with the state
of each key on the keyboard, but works
only with GUI applications. This method is
very simple to perform and undetectable
as there is no embedding of DLLs or
hardwired installation, however for better
results it is necessary to use high speed
interrogation, in the order of no less than
10-20 polls per second, otherwise data
can be missed.
Countermeasures: Detecting cyclic
interrogation in itself is not difficult. The
main problem is how to tell whet her it is
a keylogger or a legitimate program doing
The first Keyloggers appeared a very long time ago.
During the MS DOS era at the end of the 80s and
the beginning of the 90s there were a huge amount
of keyloggers about, most of which were written in
assembly language and used the INT9h interrupt
and INT16h capture. Along with the development
and distribution of Windows came the Windows
keyloggers. Their creation was made simpler by
the fact that the Windows GUI already included
a standard keyboard event capture mechanism
and keyloggers based on this system where very
simple and contained no more than thirty to fifty
lines of code. Additionally, such Windows features
as multitasking and multi-window applications
interfaces have made the spies’ task wider. In order
to simplify protocol analyses, today’s data spies have
to determine to which window and which particular
application an input belongs. They can track a user’s
Internet activity, trace IM correspondence, take
screenshots of the display and the active windows
and perform a whole host of similar nefarious
actions, right up to secretly activating the microphone
and webcam. As a result, the majority of modern
keyloggers could more accurately be described as
’universal loggers’ or ‘universal spies’. It should be
noted that most modern keyloggers will actively
disguise their presence on a system, usually with the
help of rootkit technologies.
THE PURPOSE OF
KEYLOGGERS AND THEIR
FIELDS OF APPLICATION
The main purpose of any keylogger is to
secretly record all of the keystrokes made by the
user. The recorded information usually relates
to whatever is happening in the active window. It
is important for protocol analysis as a Windows
user may randomly change the active window a
number of times. Another thing that has to be
borne in mind when working with text in present-
day applications is the possible use of the
Windows clipboard. Thus a keylogger has to keep
track of the clipboard contents and incorporate
it into the protocol when a ‘paste’ command
is detected. The protocol recorded during a
keylogging session then has to be analyzed either
automatically or by the person who installed
the keylogger for the purposes of recovering the
desired data. Typically this will include passwords,
account and credit card login credentials or
specific behavior, such as the entry of data into a
password field or form on a given website.
Statistically keyloggers are more often than
not used as follows:
•	Domestic usage: parents spy on children;
husbands and wives spy on each other, etc. In
this situation we are talking about the home PC,
where installing a keylogger and analyzing its
protocol is relatively easy.
•	In a business environment keyloggers can be
used for different tasks:
□	It can be used by an insider as an instrument
to secretly spy on their colleagues. The worst
scenario is when the insider is a member
of the IT department, which allows them to
install a keylogger on a user’s computers and
gain access to the recorded data later on
without any problems.
□	A security department may install keyloggers
to spy on users for any number of reasons. The
detection of improper PC use, the collection of
data in internal investigations, the monitoring
of users correspondence and IM traffic, etc.
Skeleton Keys
The ability to monitor what a PC user does on their computer is of great
interest to the cybercriminals, primarily for the purposes of espionage and
the stealing of passwords, but it can also be a positive thing, assisting
with legitimate tasks such as managing staff productivity and protecting
a company from the unwanted disclosure of information. It has long been
understood that where demand exists, supply is sure to follow, and thus
the market is rich in espionage technologies, of which some are free and
others are not. The largest demand within this market is for keyloggers.
Oleg joined Kaspersky
Lab in 2007 as a
Developer in the Complex
Threat Analysis Group.
He was promoted to
Technology Expert
in November 2008
and is responsible for
carrying out research
into new detection and
disinfection technologies,
investigating and
disinfecting remote
systems and analyzing
the behavior of malware.
Article by
Oleg Zaitsev
Chief Technology Expert
at Kaspersky Lab
SpyAgent allows you to monitor virtually everything users do on your computer
Antivirus programs, for example Kaspersky Internet Security 2010, react unequivocally to cyclic interrogation
from the hidden window
TOP STORY | Keyloggers
www.secureviewmag.com14 |SECUREVIEW 3rd
quarter 2010
Keyloggers | TOP STORY
www.secureviewmag.com 3rd
quarter 2010 SECUREVIEW |15
procedure for every IRP of the IRP_
MJ_READ type. The keylogger does
this with the help of the API function
IoSetCompletionRoutine. During the
termination procedure the keylogger has
to analyze the received keystroke data
and then enter it into the protocol or
transfer it to the User Mode component
for further analyses and recording.
•	Substitution of the system keyboard
driver with the keylogger driver.
•	The use of rootkit technologies. This
approach equates to a User Mode
rootkit keylogger and can intercept
PeekMessage in win32k.sys functions
by means of searching for and modifying
their addresses in the system table
KeServiceDescriptorTableShadow.
Countermeasures: Preventing kernel-
mode keyloggers is more difficult as an
application that installed its own driver
can control the system. However it is
possible. As a minimum, antivirus programs
can block the installation of unidentified
drivers, especially if it is a hidden
installation. Additionally, interception
analyses are possible (for the detection of
rootkit-keyloggers) as well as analyses of
the chain of keyboard driver driver-filters.
HARDWAREKEYLOGGERS
A hardware keylogger is a device
that performs the logging of keystroke
information and is hardware-based
and does not rely on the installation of
any software. The main danger of the
hardware keylogger is that it makes it
impossible to detect the keylogger using
an antivirus or antikeylogger solution.
Additionally, some types of hardware
keyloggers do not even require a physical
connection to the PC at all. By its
principle of operation and information
acquisition methods, the hardware
keyloggers can be classified according to
several categories.
Connected to the keyboard
Often these keyloggers are connected
to the keyboard interface cable. They are
universal and usually connected without
the need to cut any cables. Generally, these
keyloggers take the form of a miniature
device with a PS/2 or USB input connector
for connection of the keyboard and an
output connector for connection to the PC.
Because of its miniature size, a keylogger
is often disguised as something familiar
to the user, for example, a ferrite filter
for the suppression of electromagnetic
interference, or a converter of some
description. The advantage of this type of
keylogger is that its connection requires
literally only a few seconds and this
operation can be performed by unqualified
staff, for example, a cleaner. Such
keyloggers accumulate recorded data on
their internal flash memory (This is the
classic solution. The amount of memory can
vary from around 2 Megabytes up to a few
Gigabytes), or they can transfer the data
via a radio link, for example with the help
of Wi-Fi or Bluetooth. It is important to note
that keyloggers such as this may contain
custom programs too, for example, to carry
out audio recording. These keyloggers draw
their power directly from the PC.
At the present moment hardware
keyloggers cost around $200-400.
A number of companies have set up
production lines for their manufacture.
There are keyloggers that sit inside
the keyboard or system block. This type
the polling, for example, a computer game.
Typically, the approach used is that if an
application window is open, visible and
remains as the input focus – it is considered
that such a poll is legitimate. When the
window is minimized or another application
window has the input focus – then such
behavior is considered suspicious and is
usually automatically blocked.
Keyloggers working as traps
Keyloggers based on a trap mechanism
(Hook) are considered the classic method
for the creation of keyboard spyware
and this approach is well documented
and works only for GUI applications.
Traps allow the keylogger not to trace
the keystrokes themselves, but to track
messages that are processed in the
windows of other GUI applications. The
hook handling code has to be placed in
a DLL, with installation and removal of
the hooks being performed with the help
of the API functions SetWindowsHookEx,
for installation of the hook, and
UnhookWindowsHookEx for removal of the
hook. When SetWindowsHookEx is being
called, the type of message is specified
as one of the parameters for which
the hook handler should be called; in
particular WH_KEYBOARD is designated
for the logging of keyboard events and
WH_MOUSE for mouse events. The hook
can be installed for a particular flow or for
all of the flows in the system.
From a technical point of view, after
registration of the hook the following
happens: after the GUI application
receives the first message that meets the
conditions for hook activation, the DLL
containing the hook code is loaded into
the process’ address space. After that the
hook code receives full privileges.
Countermeasures: The hook’s
installation is not hard to detect and block
with the help of a behavioral analyzer;
also it is not difficult to study the behavior
of the hook code and its reaction to a
keyboard input. The main problem is how
to tell the difference between a keylogger
and a legitimate program, for example, a
keyboard format switcher.
Rootkit-keyloggers
This is relatively rare, but one of the
most dangerous keyboard spies. Its
principle of operation is based on its
ability to capture any set of functions
responsible for message processing or
processing of the inputted text. In the
simplest case, this method is based
on the capture of the GetMessage,
PeekMessage and TranslateMessage
library User32.dll functions, which allows
the monitoring of any messages received
by the GUI applications.
The danger of this keylogger is that
interception can be carried out with
the help of various methods, the set
of captured functions are not known in
advance. ‘Targeted capture’ is possible
when the capture code is inserted only
into specific applications and only under
certain circumstances, for example, when
a password input window is displayed.
Another dangerous feature of the rootkit
keylogger is that virtual keyboards cannot
provide protection from them.
Countermeasures: The embedding
of the capture code is a potentially
dangerous and suspicious action, which
is why it can be detected and neutralized
by antivirus programs during penetration
and at the stage of heuristic checking, for
example, during emulation before launch.
Kernel-mode keyloggers
Spyware of this class are based on the
following three principles:
•	Installation of a driver-filter for the
keyboard driver. The method of writing
these drivers has been documented,
for example, it is possible to find
relevant information in the DDK (Driver
Development Kit) on the Microsoft
website (article ID 176417) as well
as an example, Ctrl2Cap, on http://
www.sysinternals.com. After loading,
the spyware must connect to the
keyboard driver stack with the help of
the IoCreateDevice and IoAttachDevice
functions. The important point is that
the driver-filter will not register IRPs
(I/O Request Packets) with data about
keystrokes, but IRPs with requests
for data from the Kbdclass driver.
Information about keystrokes will be
available from the moment that the
Kbdclass driver finishes the IRP and
transfers the requested data to the
IRP buffer. Therefore the keylogger
filter has to install its own terminationAVZ Analyzer is able to describe keylogger behavior in detail
Modern hardware keylogger is not hard to make
The principle of operation of the UserMode keylogger is quite simple
Examples of commercial hardware keyloggers
Corporate keyloggers
Separate mention should be made of
that specialized category of keyboard
spies - keyloggers for the corporate
network. As a rule, they contain a
means for their automatic centralized
installation and online management
and can be integrated with the
domain controller and the personnel
record databases. The transmission
of data from such a keylogger on the
management server can be in real-time.
The keylogger’s controller is also placed
on the server as well as the database
for the accumulation of any results and
the analysis tools necessary to examine
the collected data. Analysis, as a rule,
takes the form of searches for passwords
and expressions and input data on the
frequency and densities of the detection
of the assigned samples. One additional
interesting feature of similar keyloggers is
the system’s reaction to specific patterns
of behavior - for example, the input of
a company’s accounting data into an
open SAP R3 window is considered a
normal action, the input of the same data
into the ICQ window causes the system
to react immediately by notifying the
company’s security services.
TOP STORY | Keyloggers
www.secureviewmag.com16 |SECUREVIEW 3rd
quarter 2010
Keyloggers | TOP STORY
www.secureviewmag.com 3rd
quarter 2010 SECUREVIEW |17
of keylogger is more difficult to detect,
but naturally, it is more difficult to install.
Usually it is installed in the same way
as a classical keylogger, but inside the
keyboard rather than in line with its cable.
It is possible to use a specially designed
frameless model of keylogger that was
created specifically for embedding, or
to create your own basic keylogger, as
can be seen at: http://www.keelog.
com/diy.html which is based on the
AT89C2051microcontroller. Using this
chip, even a schoolboy with an elementary
knowledge of electronics can manufacture
their own keylogger. Additionally, some
companies produce keyboards with
keyloggers already built in which are
indistinguishable from normal ones. (See:
http://www.keelog.com/usb_hardware_
keylogger.html).
Countermeasures: It is very difficult
to protect against hardware keyloggers
as they are almost undetectable using
software tools. The word ‘almost’ is used
here as hardware keyloggers contain
software components that interface with
the hardware. As for the rest, the protection
measures available are pretty low-tech
and include protecting keyboard frames by
using labels and seals along the assembly
joints, the placing of sticky labels on the
points of connection of the cables to the
system block and sealing the system
block itself. Keeping a label log and doing
periodical label audits is then necessary.
Keyloggers operating without
connection to the keyboard
This type of keylogger is much more
exotic than the rest and is utilized when
the acquisition of immensely desirable
information is required and when it is not
possible to use commercially produced
hardware solutions.
Essentially, these keyloggers capture
the secondary electromagnetic radiation
emanating from keyboards and their
associated cabling. The main problem
with using these keyloggers is that the
secondary radiation coming from a
keyboard is of such low signal strength
that it is difficult to pick up from a long way
away. The task is even more difficult to
perform in a room where there are several
computers, each with identical keyboards.
However, stories about the successful
capture of data from distances of 10-20
meters as well as about the development
of such equipment appear in the popular
press from time to time. For example, the
article http://lasecwww.epfl.ch/keyboard/
even contains a video demonstration of
just such a process.
Countermeasures: Countermeasures
are common for Secondary Electromagnetic
Radiation and Induction (SERI). Screening
and good earthing decrease the level of
SERI and special disturbance generators
make it significantly more difficult for
cybercriminals to intercept and identify any
useful information.
Another well known method is simpler
to perform and based on the capture and
analysis of the sound produced by the
individual keystrokes. Scientists from the
University of Berkeley in California carried
out significant amounts of research in this
field and in their results published in 2005
they showed that it is possible to recognize
between 60 and 90% of keystrokes using
ordinary sound recording techniques.
Countermeasures: The main method
of protection in this case is to advise
personnel of the risks and explain that
inputting their password when a mobile
phone is on the table nearby is not the
best way to ensure security.
Secretly observing input
This method becomes more and more
topical because of the fact that modern
portable autonomous video recorders are
no larger than a box of matches in size
and come in many guises: watches, pens,
lighters, packs of cigarettes, car alarm/
locking fobs, calculators, organizers and
other small devices that do not attract
any special attention. The criminal can
‘accidentally’ leave such a recorder on
somebody’s table and come back to pick
it up a couple of hours later. It is important
to say that just a few years ago this type
of devices could only be seen in spy
movies, now they are being manufactured
commercially. Therefore it is not unusual
to come across such devices in the hands
of the cybercriminals. They range in price
from $100 to $400. Such devices are
mainly used in the corporate sphere,
where the probability of commercial
espionage is quite high.
Countermeasures: The main method is
to train and instruct personnel that there
should be no unauthorized devices at their
workstation and particularly in the vicinity
of the screen and keyboard, especially
those left by ‘forgetful’ visitors.
PROTECTIVE MEASURES
As you already know, there is a large
number of keyloggers of different types,
each with its own set of dangers. Let’s have
a look at the main universal methodologies
that can be used to combat keyloggers. It
is important to note that maximum effect
is achieved when a combination of the
measures discussed are used.
Antivirus products
An antivirus solution offers a minimum of
two lines of protection, signature detection
and detection by the various heuristic
procedures which analyze the behavior of the
application. It should be noted that signature
detection is not very effective for a number
of reasons, the two most basic being:
•	The standard keylogger is extremely
simple in design and can be written by a
student in 1-2 days (plus on the Internet
there are many complete source
codes available). Consequently, the
signature detection of such home-made
keyloggers will be relatively ineffective;
•	Strictly speaking the keylogger is
not a harmful program. It can be a
commercial application with a license
agreement and an installer and the
detection of this application is not
entirely warranted, especially if we are
talking about a corporate product;
Accordingly, heuristic analysis on the
basis of emulation data or behavioral
analysis for example, is not subject to the
drawbacks mentioned above.
Virtual keyboard
Virtual keyboard is an application
(either stand-alone or part of a protection
package), intended for emulation of the
keyboard. The keys of the virtual keyboard
are pressed with the help of a mouse.
Generally, use of a virtual keyboard
makes it possible to evade all forms of
hardware keyloggers as in this case, the
normal keyboard is not used. However, it
does not provide protection from many
software-based keyloggers and other
espionage measures, such as the taking
of screenshots. However, antivirus or
anti-keylogger virtual keyboards will
activate a number of additional measures
to enhance protection, such as blocking
traps, the prevention of screenshots and
other similar activities. The range and type
of these countermeasures are specific to
each product.
Password Managers
A password manager is an application
which contains a database of the user’s
login credentials. Generally the database will
be encrypted and a master password known
only to the user is required for access to
and decryption of the database’s contents.
Sometimes biometric authorization or a
USB-token can serve as a password. The
benefit of password managers is that
passwords are not entered manually each
time, which completely excludes their
interception by all forms of hardware and
software keyloggers.
Rejecting the usual
passwords and PIN codes
The means of protection described
above can be supplemented with the
following methods, which guarantee an
additional level of safety.
•	The use of code tables. A code table
is a normal table, which can be stored
in the form of a picture or printout and
contains X times Y number of cells.
Generally anything from 10 x 10 to 16
x 16 is used. A table is generated by
the server and a copy is sent to the
user for printing (or a copy is sent via
registered post). When carrying out
the authorization process the user
is prompted to enter the contents of
certain cells selected at random by the
server. This process can either take
the place of a password or can be in
addition to it. It can be seen that the
interception of a specific combination
will make it possible to learn the
value of two or three cells from the
possible hundred-plus and that during
subsequent authorization sessions,
other cells will be requested. However,
the keylogger is unable to fix the
requested cells position - and so the
criminals will not know which cells were
involved without resorting to taking a
screenshot. The benefit of this method
lies in its simplicity. Similar technology
is used by the Russian payment
transfer system Yandex Money.
•	Use of one-time passwords. This
method is similar to the previous one,
but in this case the user receives a
table of one-time passwords, and
once used, that password is then
crossed out. The method can be used
in reverse, with the user removing
the opaque protective coating from a
sequential password list printed on
a card. In this method the danger of
password interception with the aid
of a keylogger is completely avoided.
However, the quantity of passwords
is limited and it will be necessary to
obtain a new list at some point.
•	Use of a password generator. An
electronic token is used for the
generation of passwords, the
generated passwords are not repeated
and they are produced according to a
specific algorithm. It is considered that
the algorithm and the secret key within
cannot be deciphered based on just a
few intercepted passwords.
•	Adopting two-factor authorization, for
example, with the use of an eToken. In
this case the theft of passwords is not
dangerous, since it is useless without
the accompanying token. The reverse
also applies. The eToken is useless
without the password.
CONCLUSION
Thus we have examined the basics
of software and hardware keyboard
spies. In summing up it is worthwhile
mentioning that the situation in this
area of technology is changing radically
by the day. Two or three years ago
hardware keyloggers were some sort of
techno-marvel, now they are produced
commercially with many different
models available, beginning with the
basic 32 KB types, right up to devices
with several GB of memory and wireless
control. It should be assumed that the
development of the hardware keylogger
market will continue and possibly in the
very near future we will see an entirely
new generation of ‘software-hardware
spies’ which will not require access to
the victim’s computer at all. RE
Kaspersky Internet Security 2010’s virtual keyboard prevents the taking of screenshots
A spy pen with an embedded video camera and recorder
for 3 hours of continuous recording can ‘accidentally’
be placed on the Director’s desk if his company is under
attack from commercial spies
Wireless keyboards - convenience
for the user or paydirt for the spy?
The developers of wireless devices
usually employ a standard interface
for the transmission of data (most
frequently Bluetooth), or use their own
bespoke system of wireless connection,
integrating a transceiver into the
keyboard, connected to the USB or PS/2
socket. In both cases, information is
broadcast about which keys have been
pressed and this can be intercepted
by a cybercriminal. Unfortunately, the
protection algorithms employed in these
circumstances often does not provide
guaranteed security. As a result, it was
only matter of time before the ‘radio
sniffer’ and ‘wireless keylogger’ was sure
to appear. Moreover, one of the most well
known practical manifestations is freely
available at http://www.remote-exploit.
org/Keykeriki.html.
A keylogger can be installed inside a keyboard without it being noticeable
ANALYTICS | Internet fraud
www.secureviewmag.com18 |SECUREVIEW 3rd
quarter 2010 3rd
quarter 2010 SECUREVIEW |19www.secureviewmag.com
Internet fraud | ANALYTICS
AMERICAN PROTOTYPE
Those websites offering audio drugs
contain an explanation that “Audio
drugs have only appeared in Russia
quite recently. They were developed by
American scientists and are in great
demand on the local market”. This
statement is disputable as this product
has never been heard of in the US, at
least in the form that was used for selling
it in Russia. It is necessary, however,
to make one exception here. Back in
1980 The American Monroe Institute did
popularize binaural waves as a means of
beneficially influencing the human psyche.
They sold tens of thousands of records
and influenced others to produce records
and generators of allegedly binaural
signals that claimed to produce effective
synchronization of brain waves.
At the peak of the popularity of binaural
rhythms in the US, a special I-Doser
program was created which became the
prototype for ‘audio drugs in MP3 format’.
I-Doser was supposed to induce an effect
analogous to audio drugs – to cause
sensations, states of mind, emotions
imitating the effects of various chemical
drugs, etc. The program had the binaural
rhythms theme right at its heart. Obviously
I-Doser was sold online, but the program
itself was free of charge and the download
also contained a few melodies. The
program gained a certain popularity in
the US and some European countries, but
certainly wasn’t the fireworks party that
the creators had hoped for. The absence
of any wide-scale promotional campaign
didn’t help either, and nearly all the users
who tried the program left feedback about
the lack of any effect at all, not even a
headache, caused by using the program.
Thus, the popularity of this new product
in the US and Europe quickly subsided, but
the idea itself continued to live on in the
minds of the ‘social engineers’.
EXPANSION EASTWARD
At first the fraudsters decided to look to
the east – Korea and China. Audio drugs
appeared there around the end of 2008
and the beginning of 2009. In these
countries the social engineers copied
the general concept of I-Doser, offering
downloads of audio files for money
that could then be listened to with the
assistance of special programs. However,
later on the situation was considerably
simplified for these and many other Asian
websites with the appearance of audio
drugs in the popular MP3 format.
Those websites that were offering
audio drugs in China and Korea stated
that the product appeared first in
Italy. Instructions for the usage of
the files were close to the Russian
version in many instances (‘put on your
headphones, close your eyes, relax…etc’)
but the principle of action was described
in maybe a little more details. The cost
of one ‘narcotic’ track started at around
$3, but many users uploaded tracks that
they had purchased to their blogs, which
others then downloaded for free.
On the one hand this led to the rapid
spreading of ‘audio drugs’ among Korean
and Chinese users. On the other, the
largest part of the information about
‘audio drugs’ available on the Internet was
not of a commercial nature, but rather
contained the opinions of those that had
experimented with the new product.
But the party ended as quickly as it
started – by summer when the audio
narcotic wave hit Russia, those in
China had already recognized that the
phenomenon was nothing more than
another fraudulent attempt to part
fools from their money and any mention
of it practically disappeared from the
newspapers and blogs overnight.
ARRIVAL IN RUSSIA
In June, when audio drugs were first
launched onto the Russian Internet, the
sellers started to operate according to their
old ways, with mass spam mailings sent
via instant messaging programs, social
networks and email.
Such mailings went on for the entire
year, but the effect from the very first wave
of spam was such that within the first
week the need to advertise was negated –
news of the audio drugs had started
spreading via word of mouth. Thus by 01
June, Yandex’s “pulse of the blogosphere“
peaked with a total of 94 mentions of
audio drugs, sound drugs and electronic
drugs. In any case, every website offering
narcotics was stuffed full of feedback
from supposed clients who’d already
experienced the sensation. Sure enough,
all of the comments were not just positive,
but highly enthusiastic. Sometimes though
the site’s authors took it too far and
enthusiasm turned into something quite
farfetched and absurd.
On top of that, ghost-users would often
pop up on message forums, or they would
create a blog and add lots of people as
friends, in order to share the supposed
‘euphoria’ that they had gained from
using the electronic marihuana. Against a
background of such powerful advertising
by the sellers, messages coming from real
users stating “I spent money, downloaded
an audio drug, listened to it and got
nothing at all from it” or “All I got was a
migraine” were largely ignored by everyone
except the friends of the user. At worst,
even the users’ friends passed it off as
“It’s all right, it’s nothing unusual. Some
feel it while others don’t.”
The instructions given to the users
by the suppliers stated that any users
wanting to experience the sensation for
themselves only needed a player, some
SCIENTIFIC APPROACH
During 2009, the social engineering fraternity
put their dubious talents to work advertising a
very interesting ‘invention’ - ‘audio drugs’. More
precisely, they used their talents slightly earlier,
inventing the whole concept themselves and
then building the websites to fit their rather
twisted purpose.
So, what on earth are ‘audio drugs’? The answer
to that question is available on any website that
sells ‘audios’, the now-common slang word for these
drugs. According to one site: “Audio drugs are files
which imitate, during the listening process, the
effects of popular drugs, or heighten sexual feelings
or produce any altered states or moods by using the
binaural effect”. The binaural effect is the ability of
a human or animal to locate an object through the
use of sound emanating from the object. The ability
to do this is simply due to each of us possessing two
audio receivers – our ears. So what the peddlers
of this material are telling us is that the effect of
popular drugs can be synthesized using sound.
As part of their ‘completely scientific’
explanation of these audio drugs, some websites
mention the principle of ‘binaural rhythms’ or
‘binaural waves’. Those rhythms are a bit more
complex, as one website explains: “Binaural
rhythms are two tones which vary slightly in
frequency, each tone being delivered separately,
one to each ear. This way, the rhythms are
perceived as being formed inside your head”.
Without going into details, it’s quite possible that
those rhythms are really being used in sound
drugs. But not in quite such a simplistic way…
Research shows that binaural rhythms do not
synchronize brain waves at all. But the creators
of the websites claim that they do, and that this
is what causes the range of feelings that the
user is supposed to experience. The ability of
those kinds of rhythms to produce a relaxing
effect has been common knowledge for a long
time already. It is used, in particular, in special
music designed for meditation purposes due to
its calming effect. Actually, that kind of reaction
has far more to do with a repetitious binaural
rhythm. Everybody knows, for example, that it is
easy to fell asleep listening to the clickety-clack
of a train’s wheels– repeating a binaural rhythm
is the same thing. The question as to whether
and how such monotonous binaural rhythms
produce the sexual effects claimed by the
website owners remains open however.
Now that we’ve got to the bottom of what
‘binaural’ really means, let’s move on and take a
look at how the creators presented their product to
us: “Audio drugs don’t damage your body and won’t
turn you into an addict, but they do have a relaxing
effect on your body, giving you all the feelings that
you get using real drugs, but without the harmful
side-effects”. In general, this part corresponds to
the ideas about using binaural rhythms in music
for meditation – which too is believed to have
a positive influence on the body. What isn’t so
clear, however, is how it’s supposed to leave you
feeling ‘positive and relaxed’ as real drugs can
do, albeit synthetically. Additionally, the authors
of the websites promise us auditory and visual
hallucinations. It’s no secret that hallucinations are
not in any way associated with a healthy mind. So,
can audio drugs ‘positively’ cause psychological
problems? What about the warnings on the
websites saying “We do not recommend that
people with existing psychological problems listen
to binaural waves as it could exacerbate their
condition.” So, a relaxing effect that damages your
mind – that sounds a little strange.
The Sound of Deception
Are you afraid of something? Do you have hopes and dreams? Got any
complexes? Are you a curious person? If the answer is ‘yes’ to any of
those questions, then you are a potential victim of the so-called ‘Social
Engineers’. These ‘social engineers’ use their advanced knowledge of
the psychological weaknesses of humans to lever unwary users into
sending them login credentials for their social networking accounts,
give them access to their PC’s, or to unwittingly ‘share’ the use of their
credit card. Additionally, social engineering is used for the shrewd
placement of product advertisements designed to generate income for
the spammers in the future.
The fraudsters didn’t stint on creating attractive, good-looking advertising for their websites
Maria has worked for
Kaspersky Lab since
August 2008, firstly as
a Junior Spam Analyst,
then rising to become
one of the Company’s
fully-fledged Spam
Analysts. Her main duties
include the analysis of
German-language spam,
completing monthly
analytical spam reports
and participating in the
many Kaspersky Lab
educational initiatives.
Article by
Maria Namestnikova
Spam Analyst
at Kaspersky Lab
www.secureviewmag.com20 |SECUREVIEW 3rd
quarter 2010
ANALYTICS | Internet fraud
3rd
quarter 2010 SECUREVIEW |21www.secureviewmag.com
Internet fraud | ANALYTICS
stereo headphones and a mobile phone.
Wait a minute…What’s a mobile phone
for? To pay for the product of course! To
receive a narcotic track a user sends an
SMS to a four or five-digit number and
then enters the code they receive into a
special field, which is not an unusual way
of doing things in Russia.
RUSSIA CAN’T
BE UNDERSTOOD....
So, what was the net effect of audio
drugs on the Russian Internet? It was –
it has to be said, overwhelming. Just a
couple of weeks after they appeared, the
young and progressive Internet community
no longer considered audio drugs a
sensation. Some tried it and leant their
expert opinion of the experience to the
knowledge-hungry public, whilst others
were keen to try it, but backed off again on
the grounds of health concerns, and yet
another group were conceptually against
drugs as a phenomenon overall, including
audio drugs in particular. Those hearing
this word combination for the first time
became more and more rare. In blogs,
forums and chats audio drugs became the
hottest topic around.
Unfortunately it was teenagers who
happened to make up the main part of the
electronic drug barons’ target audience,
and as is well known, teenagers are
fairly easily persuaded to try new things,
regardless of their parents’ advice to the
contrary. Tell the younger generation who
have just entered the so-called ‘awkward
age’ that smoking is cool and predictably–
half the school will be hiding from the
teachers and having a cigarette. They do it
to demonstrate the “I am cool” message
to others. The same goes for audio drugs.
Whether it was part of the ‘engineers’ plan
or just happenstance, who knows, but the
major part of their Russia audience turned
out to be between 13 and 16 years old.
Teenagers tried the audio drugs just so
that they could turn up at school with the
appearance of being a sophisticated drug
user and report on their “sensational”
experience. Also discussions seen on some
teenagers’ forums often used another very
appropriate word - ‘autosuggestion’. This
is another vulnerability that the ‘social
engineers’ exploited. In other words, those
‘sophisticated drug users’ of 13-16 years
old often did really believe that they ‘got
a kick’ from what they listened to. They
convinced themselves that they had had all
the sensations that they believed a person
should experience having used one of the
more well-known drugs. So by listening to
monotonous binaural rhythms they only
managed to get excited and hyped up
instead of calming down and relaxing.
However the desire to look cool in
front of one’s peers and the attraction to
forbidden fruits are simple human vices,
characteristic not only of teenagers, but
adults as well. It cannot be forgotten
either that many people, when hearing
the words ‘audio drugs’, would have felt
curiosity and a desire to try something
new, thus we can state with confidence
that the ‘social engineers’ received quite
a wide audience ready to pay for their
‘engineering miracles’. Ostentatious
pseudo-science also helped the criminals
not by chance, but in strict accordance
with their plans. The bait was swallowed
not only by schoolchildren, students
and ordinary Internet users, but also
journalists, including those working in big
news and analytical web publications.
It’s interesting to note that the majority
of publications, especially in the first two
months, did not try to understand the
deeper nature of this phenomenon, nor
did they try to explain to their readers what
audio drugs really were. Most articles
published during July and August were
based on the information provided by the
websites distributing the electronic drugs,
and the majority of user reviews in the
publications were just the usual crop of
very artificial ‘bait’-type materials which
the ‘social engineers’ had placed on the
Russian Internet themselves. The only
threat presented to the readers of those
publications was the line that audio drugs
couldn’t be any more dangerous than
traditional chemical ones. The first articles
that brought people round to believing that
audio drugs were nothing more than simple
fraud appeared only at the end of summer,
after an article called “Attention! A new kind
of fraud” was published on the website
of the Interior Ministry on 27 August.
Unfortunately by that time “A new kind of
fraud” was not new anymore and it was
quite difficult to convince many people of it.
In a few months after the appearance
of ‘the miracle’ on the Russian
Internet, it attracted the attention of
the authorities of some regions. On 23
September 2009 in St.Petersburg, audio
drugs were treated almost the same
as pornography and their distribution
among the under-aged strictly forbidden.
As was announced by the Kommersant-
SPB newspaper (№ 177 (4232) of
24.09.2009)”…trading in such products
is banned within a radius of 150 meters
from child-care and educational facilities,
including high schools and universities”
The loud noise in the press also
played right into the hands of the
criminals distributing the stuff. The
scare-mongering titles of the Internet
newspapers and independent analytical
articles only attracted more of the curious
to it. The ‘social engineers’ themselves
started to use ’scandal’ topics to attract
attention to their product. “Danger: audio
drugs can be downloaded for free!”, “Audio
drugs affect brains” and “Audio drugs in
MP3 format cause harm” – screamed
the subject line of one of the posts on a
popular blogging resource. However, the
same post then went on to say that audio
drugs are “cool” and provided links to
some respective sites where one could
find one’s own proof.
THECROPISGATHEREDIN
Audio drugs as we all know only too
well were very successful for the ‘social
engineers’. Certainly, behind all the noise
and doubts about ‘High – or no high’,
‘Harmful – or not harmful’ there lies a
simple thirst for profit. The abundance
of similarly-styled websites appearing
en-masse on the Internet at the time
were nothing more than the fruits
of partner program activity. It’s well
recognized that many of the participants
of partner programs certainly don’t hide
their activities and openly share their
impressions of their associations with all
and sundry.
It was thus in a blog on one of the
partner program websites during mid-July
that the following information appeared.
“As far as audio drugs go – when it was
new the theme was great! I tried this
theme a month ago and very quickly
hit 100K Roubles a day! The author
goes on to describe in detail which
tools were used to promote it on which
websites, before eventually admitting
to making “20-60 of Dollars per day”.
So popular has this theme proved, that
cybercriminals were willing to shovel
money at it, whilst journalists, deputies
and simple users continued their
ideological disputes about whether audio
drugs were harmful or not.
SOMETHING NOVEL?
By the autumn of 2009, largely due to
the recession, the fever had died down.
It was time for the social engineers’ to
come up with their next big thing and it
needed to be bigger and better than their
previous brainchild. This time it wasn’t
long in the making, driven by their urge
to earn big bucks. Adding a new twist to
their previously successful scam, they
introduced ‘Stereohypnosis’ and to make
sure everyone knew about their latest
novelty, they spammed just as many as
they could by every available means.
The theme of audio drugs undoubtedly
had become very noticeable very quickly.
Despite that, it was already possible to
search Google and find websites offering
video files for download which supposedly
acted on the subconscious, this time,
by means of ‘stereohypnosis’. The name
has become more lengthy and complex
if you notice. ‘Social engineers’ have
long continued to play up the pseudo-
scientific nature of their ‘inventions’. With
stereohypnosis they went one step further,
making it better and more interesting-
sounding than plain old audio drugs. An
explanation consisting of scientific terms
and offering descriptions of its principles
lends itself as well to the electronic page
as it does to the printed page.
Exactly as with the audio drug websites,
stereohypnosis it was claimed, caused
altered states of consciousness– from
offering relaxation after a long day’s work,
to the heightening of sexual stimulation.
Among the many websites offering various
methods to heighten sexual sensations it’s
not difficult to find many selling ‘A stereo
version of viagra‘.
Creditable reviews from those exalting
the power of hypnosis have long since
appeared on numerous web pages and
websites, and in abundance on the
websites distributing ‘stereohypnosis’.
CONCLUSION
Whatever they do, there are large
doubts that the ‘social engineers’ will
repeat their earlier triumphs, advertising
got underway at the beginning of March
and since then there’s been a distinct
lack of noise from either the electronic
mass-media or the Internet communities.
It seems to prove that the spam mass-
mailings were not as effective as in the
past and that the ‘social engineers’ may
have miscalculated. Firstly, over the past
few months many people have started to
associate payment by SMS-messaging
to short numbers with being ripped off.
Secondly, ‘stereohypnosis’ does not
actually offer anything new under the
sun, and besides, the similarities of the
websites just reinforce peoples’ feelings
of distrust, not to mention the statement
itself, ‘Safe Drugs’ proving an oxymoron
for just too many. RE
Some Russian spam simply contained a link for users to click on, without even mentioning the product in the text
Stereohypnosis’ – the next big thing for the gullible
The Chinese press was quick to pick up
on the topic of audio drugs
The I-Doser program was even available as an iPhone app!
ANALYTICS | Vulnerabilities in Adobe Software
www.secureviewmag.com22 |SECUREVIEW 3rd
quarter 2010
Vulnerabilities in Adobe Software | ANALYTICS
www.secureviewmag.com 3rd
quarter 2010 SECUREVIEW |23
A day later, Jeremy Conway, a Researcher
and Product Manager with NitroSecurity,
demonstrated a way to copy the
embedded executable from one PDF
file to another using Adobe Reader,
opening up the possibility
of a PDF worm.
It's a beautiful target, if you want to do
some damage, Conway says. I don't know
of any target larger than Acrobat Reader.
Welcome to Adobe's world. The
popularity of the portable document
format has made Adobe's Reader and
Acrobat top targets of researchers' and
attackers' efforts to find and exploit any
application flaws. The company's other
ubiquitous platform, Flash, has attracted
similar attention from attackers focused
on exploiting victims through the web.
Typical attacks either focus on the
browser or popular browser extensions,
such as Flash Player.
In that bucket, Flash is at the top of the
list, says Michael Sutton, Vice President
of Research for web security firm Zscaler.
The attention of attackers spells out a
big problem for Adobe. Last year, Adobe
Acrobat and Reader became the No. 1
target among flaw finders focused on
file-format vulnerabilities. While attackers
and researchers ramped up research
on Microsoft Office starting in 2006, the
number of vulnerabilities disclosed in Office
formats peaked in 2008. Now, Adobe
Acrobat and Reader are the top targets. Last
year, researchers found 48 vulnerabilities in
Acrobat and 38 in Reader. Security issues in
Office had dropped to 35.
The trend looks likely to continue this
year, with Adobe's two products on track to
see more flaws and Microsoft Office less.
UNDER ATTACK
It's not only researchers that have
taken a greater interest in Adobe
products. Malicious emails using Adobe's
PDF format account for 61 percent of
all the targeted attacks seen so far
in 2010, according to antivirus firm
F-Secure. Overall, targeted attacks are
set to double this year, according to
Sean Sullivan, a Security Advisor with the
company's North American Labs.
We are seeing a higher percentage of
attacks using PDFs and more attacks as
well, Sullivan says.
Attackers also have Adobe's Flash
platform in their sights. In the last half
of 2008, a vulnerability in Flash Player
became the most exploited browser
security issue, according to Microsoft's
Security Intelligence Report. In the first
half of 2009, the most recent data
available, the trend continued with
17.5 percent of browser-based exploits
attacking one flaw in Adobe's Flash Player.
The trend comes as no surprise. Over
the last decade, researchers have moved
away from finding operating systems
vulnerabilities and focused instead on
applications, where flaws are easier to find.
Applications now make up the vast
majority of vulnerabilities. Jeff Williams,
Principal Group Program Manager for
Microsoft's Malware Protection Center,
told Threatpost in a statement.
The increased attention has put Adobe
products and their development process
in the spotlight.
Microsoft found itself in a similar
position a decade ago. In 2001, the
double tap of the Code Red and Nimda
worms, which exploited a handful of flaws
in Microsoft products, led to the company
creating its Strategic Technology
Protection Program and to CEO Bill Gates'
decision to turn the Microsoft juggernaut
around and focus on security. The
company did not have a chance to lose
its resolve either. The spread of Slammer
in 2003 led to Microsoft committing to
improving the quality of its patches and
simplifying its autoupdate process. Two
months after that, MSBlast infected
millions of Windows PCs, prompting
Microsoft to focus its next service pack
for Windows XP on security.
Microsoft climbed that learning curve
ahead of other vendors, says Zscaler's
Sutton. Adobe is definitely on that
slope – again, because they had to be.
There is a negative reputation that the
security in Reader and Flash are in need
of improvement.
FROM REACTION
TO ACTION
For Adobe, the turning point came in
2008. While Microsoft and its Office
applications continued to take the brunt
of researchers' and attackers' efforts to
find flaws in file formats, the number of
vulnerabilities disclosed in Acrobat and
Reader had hit an all time high.
Revamping the company's approach to
security became a top priority at Adobe.
In August 2008, the company hired
Brad Arkin – a former manager from
Symantec and @Stake – to head efforts
to secure their products. In December,
the company opened up communications
with the security community with a
statement simply titled: We care.
It is very clear to Adobe that we are
receiving increased attention from the
security community, Peleus Uhley, a
Senior Security Researcher at the firm,
wrote in the blog post at the time. Adobe
has been responding to this increased
attention over the course of the last year
by proactively investing in both internal
and external security measures to further
protect our customers.
As part of its efforts, about half the
company has gone through a security
When security consultant Charlie Miller
decided to look for vulnerabilities in popular file
types, selecting the portable document format
was a no-brainer.
Something like 90 percent of computers have
Adobe Reader on them, he says. These are
programs that are ubiquitous in use, but have
a track record of security problems on them,
and that makes them interesting. Miller found
that a fairly dumb script that tries different
combinations of PDF file inputs can cause a
large number of possibly-exploitable crashes in
Adobe Reader and Apple's Preview PDF viewer.
Miller, a Principal Consultant at Independent
Security Evaluators, is not alone in his interest.
A week after Miller's presentation, researcher
Didier Stevens reported that the warning
message displayed by the command for
launching external applications from Adobe's
Reader and Acrobat could be modified, allowing
malicious applications to be run from a single
PDF file with a watered-down warning message.
The Downside of Ubiquity
Three years ago, attackers favored Microsoft Office as their vector
of choice for compromising systems. Now, Adobe’s products are
under the microscope.
Adobe created webpage that contains important information regarding security vulnerabilities that may affect specific versions of Adobe
products and solutions
National Vulnerability Database statistics data
0
15
30
45
60
2004 2005 2006 2007 2008 2009
Vulnerabilities Disclosed
Microsoft Office
Adobe Acrobat
Adobe Reader
Adobe Flash Player
Robert Lemos is a veteran
technology journalist
of more than 13 years,
focusing on computer
security, cybercrime, and
enterprise issues. Mr.
Lemos spent eight years
as a staff writer at ZDNet
News and as a senior
staff writer at CNET News.
com, which purchased
ZDNet in 2000. He acted
as editor-at-large for
SecurityFocus, a security
news and information site
owned by Symantec Corp.,
from April 2005 to August
2009, providing daily
independent journalism
and investigative
articles covering security
incidents, malicious
code, vulnerabilities
and cybercrime.
Article by
Robert Lemos
Secureview 3
Secureview 3
Secureview 3
Secureview 3
Secureview 3
Secureview 3
Secureview 3

Contenu connexe

Tendances

How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
Michael Soltys
 
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
Mandar Kharkar
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...
Mark John Lado, MIT
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
Joseph White MPA CPM
 
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
CODE BLUE
 

Tendances (20)

How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMS
 
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security Model
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Introduction and a Look at Security Trends
Introduction and a Look at Security TrendsIntroduction and a Look at Security Trends
Introduction and a Look at Security Trends
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
 
P50 fahl
P50 fahlP50 fahl
P50 fahl
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
 
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
 

Similaire à Secureview 3

1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games Text
MartineMccracken314
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games Text
SilvaGraf83
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
Chema Alonso
 

Similaire à Secureview 3 (20)

Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
 
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secure
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
 
185
185185
185
 
Cisco Annual Security Report 2016
Cisco Annual Security Report 2016Cisco Annual Security Report 2016
Cisco Annual Security Report 2016
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games Text
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games Text
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
 
Cisco asr-2016-160121231711
Cisco asr-2016-160121231711Cisco asr-2016-160121231711
Cisco asr-2016-160121231711
 
Cisco Annual Security Report
Cisco Annual Security ReportCisco Annual Security Report
Cisco Annual Security Report
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security Report
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
 

Plus de Felipe Prado

Plus de Felipe Prado (20)

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interface
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portals
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devices
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Secureview 3

  • 1. 3rd quarter 2010 MAJOR POSSIBLE THREATS OF 2010: More widespread and more complex THE SOUND OF DECEPTION Internet fraud is becoming more ingenious A NEW ROUND OF CONFRONTATION How to fight crimeware more effectively THE DOWNSIDE OF UBIQUITY What to do about Adobe’s software vulnerabilities THE EXPERTS COMMENT SKELETON KEYS Modern Day Keylogging Techniques’
  • 2. CONTENTS NEWS Breakthroughs and trends in the IT security industry 4-7 REPORT Infosecurity Europe: Catch up on all the latest developments from London 8-9 TOP STORY Skeleton Keys: Everything you should know about current keylogging techniques 10-15 ANALYTICS The Sound of Deception: Modern Internet fraud 16-19 The Downside of Ubiquity: Vulnerabilities in Adobe software 20-23 A New Round of Confrontation: Fighting crimeware 24-27 TECHNOLOGY Somewhere Between Black and White: Whitelisting technology uncovered 28-31 FORECASTS More Widespread and More Complex: Threatscape 2010 32-34 INTERVIEW Challenging Rootkits: Complex threats of today and tomorrow by Vyacheslav Rusakov 36 A WORD FROM THE EDITOR Dear Readers, I am very pleased to be able to bring you the first issue of SECUREVIEW, a magazine dedicated to all aspects of the IT security industry. We hope that you will find it interesting and informative and we look forward to receiving your feedback. The News section at the beginning of our magazine will bring you right up to date with all the latest trends and exciting discoveries in the field of information security. There will be reports from recently held conferences and exhibitions, many of which will set the course for the industry’s development in the year ahead. In this issue our Top Story is dedicated to the important subject of the theft of personal data using keyloggers, something that will be of particular interest to representatives of the corporate sector. In the coming issues we will be bringing you detailed analyses of the hottest topics in the industry, reflecting the interests of users’ right across the board. In our Analytics column some of the world’s leading experts and journalists will share the results of their research into the field of digital safety with you, examining the burning issues of the day and providing solutions to those IT security problems so often encountered by people in the field. Technological knowhow is very important for the IT security industry and that is why in every issue our Technology section will cover the most interesting solutions from the last few years that we think have seriously influenced the computer security market. Then there’s our Forecasts section, which we are confident will appeal to a very wide audience. Finally, for dessert we’ll be putting the industry’s experts in the hotseat and getting their responses to some pretty tough computer security related questions in our Interview section. We hope that the topics covered in this first issue of our magazine will appeal to you and most importantly, if you are working within the industry, we hope that you will be inspired to share your own knowledge and experiences with our readers – we always welcome new authors. You will be rewarded for your efforts and interesting articles will definitely be published! Please, contact us at: editorial@secureviewmag.com, to leave feedback, submit an article, or tell us what topics you would like to see covered in the future. See you next issue! Alexander Ivanyuk Editor-in-Chief Alexander Ivanyuk SECUREVIEW SECUREVIEW Magazine 3rd Quarter 2010 Editor-in-Chief: Alexander Ivanyuk Editor: Darya Skilyazhneva Design: Svetlana Shatalova, Roman Mironov Editorial matters: editorial@secureviewmag.com http:// www.secureviewmag.com Production Assistants: Rano Kravchenko, Ryan Naraine The opinion of the Editor may not necessarily agree with that of the author.
  • 3. NEWS www.secureviewmag.com4 |SECUREVIEW 3rd quarter 2010 NEWS www.secureviewmag.com 3rd quarter 2010 SECUREVIEW |5 In the world of botnets and denial- of-service attacks, 2009 was a very interesting year. The analysts at Arbor Networks recently looked back at the data collected by about 100 of their ISP customers on DDoS attacks in 2009 and found that there were more than 20,000 attacks that peaked above one Gbps of traffic, and nearly 3,000 attacks that hit 10 Gbps. That’s a lot of traffic, especially when you consider that “many, indeed most, enterprises remain connected to the Internet at 1 Gbps or slower speeds,” as Arbor’s Danny McPherson points out. Today, most enterprises and online properties don’t traditionally factor DDoS attacks in risk planning and management related processes. That is, while they go to great lengths to periodically obtain coveted compliance check marks related to data integrity and confidentiality, the third pillar, availability, often takes a backseat. This is perhaps largely driven by auditors with fairly static and quantifiable lists of controls that can be put in place to contain risks associated with traditional vulnerabilities. Unfortunately, lack of foresight and appropriate preparation often leaves folks scurrying about madly when DDoS- related incidents do occur, as they’re not considered until you’ve been hit at least once. Most reasonably sized organizations have a comprehensive plan for dealing with network outages caused by natural disasters. But many of them may not know what to do if they’re targeted by a major DDoS attack. But, as Arbor’s data shows, large DDoS attacks are not the rarity they once were and it’s probably better to know who’s going to do what and when before an attack happens, than afterward. ENCRYPTION Pico Computing based in Seattle, Washington, announced that it has achieved the highest- known benchmark speeds for 56-bit DES decryption. The company reported a throughput of over 280 billion keys per second achieved with the use of a single, hardware- accelerated server. The FPGA computing platform assembled for this demonstration was based on 11 Pico EX-Series cards, and fits into a single off- the-shelf 4U server. The massively parallel DES cracking algorithm used brute force methods to analyze the entire DES 56-bit key-space. It iteratively decrypted fixed-size blocks of data to find keys that decrypt into ASCII numbers. This technique is often used for recovering the keys of encrypted files containing known types of data. The candidate keys that are found in this way can then be more thoroughly tested to determine which candidate key is correct. The 56-bit Data Encryption Standard (DES) is now considered obsolete, having been replaced by newer and more secure Advanced Encryption Standard (AES) encryption methods. Nonetheless DES continues to serve an important role in cryptographic research and in the development and auditing of current and future block-based encryption algorithms. Source: www.picocomputing.com Source: http://arxiv.org/ftp/arxiv/papers/1002/1002.4530.pdf Scientists from South Korea, the USA and India have invented a novel scheme for securing the transfer of data across computer networks. The typical security method for preventing data from falling into the wrong hands is by the use of encryption. However, the cost of implementing encryption on a network is high due to its computational complexity. The essence of the proposed scheme is to break the data to be transferred into many smaller parts. When put back together, these parts become the original piece of data again, but only if they are reassembled in a particular way, just like a jigsaw puzzle. The correct method for reassembling the pieces is known only to the recipient for whom the data is intended. Any unauthorized entity that intercepts the message fragments will not have sufficient information to correctly reassemble the component parts of the communication and thus will not be able to read the message. Cracking 56-bit DES Jigsaw Puzzles CODING Source: http://cwe.mitre.org/top25/ The ‘Common Weakness Enumeration’ initiative from the non-profit MITRE Corporation includes its 2010 list of the 25 most dangerous programming errors. The list is compiled by more than 50 experts from such respected IT-organizations as The SANS Institute, RSA, Red Hat, Sun, Microsoft and others. The most critical programming errors that can lead to serious software vulnerabilities are arranged in the list according to their importance. All noted flaws are dangerous because they frequently allow attackers to completely take over the software, steal data, or prevent the software from working. Cross-site scripting (XSS), SQL injection, and Buffer overflow are considered to be the most hazardous of all the listed errors. The rating also contains detailed technical descriptions of the flaws, code examples and related attack patterns, as well as their methods of error prevention and mitigation. The 25 Most Dangerous Programming Errors Table 1. ‘SANS/MITRE’s Top 25 Most Dangerous Programming Errors’ 1 Failure to preserve web page structure (‘Cross-site Scripting’) 2 Improper sanitization of special elements used in an SQL command (‘SQL Injection’) 3 Buffer copy without checking size of input (‘Classic Buffer Overflow’) 4 Cross-site request forgery (CSRF) 5 Improper access control (Authorization) 6 Reliance on untrusted inputs in a security decision 7 Improper limitation of a pathname to a restricted directory (‘Path Traversal’) 8 Unrestricted upload of file with dangerous type 9 Improper sanitization of special elements used in an OS command (‘OS Command Injection’) 10 Missing encryption of sensitive data 11 Use of hard-coded credentials 12 Buffer access with incorrect length value 13 Improper control of filename for include/require statement in PHP program (‘PHP File Inclusion’) 14 Improper validation of array index 15 Improper check for unusual or exceptional conditions 16 Information exposure through an error message 17 Integer overflow or wraparound 18 Incorrect calculation of buffer size 19 Missing authentication for critical function 20 Download of code without integrity check 21 Incorrect permission assignment for critical resource 22 Allocation of resources without limits or throttling 23 URL redirection to untrusted site (‘Open Redirect’) 24 Use of a broken or risky cryptographic algorithm 25 Race condition Large DDoS Attacks Still a Serious Problem Israeli scientists from the Ben-Gurion University reviewed the security system of the prospective Android software framework from Google. The researchers defined the main threats, high- risk vulnerabilities, existing protection tools and relevant security solutions. The incorporation of integrated Internet services on mobile devices increases their exposure to damage inflicted by various types of malware. The risk is amplified by the fact that as a smartphone, Android devices are expected to handle personal data and provide PC- compliant functionality, thereby exposing the user to all the attacks that threaten users of personal computers. Google Android is a comprehensive piece of software for mobile communication devices. The Android framework includes an operating system, middleware and a set of key applications. The review indicates that the security mechanisms embedded in Android address a broad range of security threats. Google has implemented the Portable Operating System Interface (POSIX) which gives each application a user ID, this prevents different applications from affecting each other. Setting each application as a different user prevents one application from accessing files and signals from another and distributes the selected kernel’s CPU consumption evenly by default. Additional security features are provided through the permission-granting mechanism that enforces restrictions on the specific operations that a particular application can perform. Signing applications is another significant security feature. The authors also looked at what additional security mechanisms could be applied on Android-based handsets, such as porting SELinux into Android and activating a security policy, enabling a net-filter- based firewall and an Intrusion Detection System based on anomaly detection (termed Andromaly), etc. Despite these measures, scientist identified five high-risk threats that need attention. The main security issue that they raised is the fact that Android is an open-source platform whose source code was published after the first Android-powered devices were released onto the market. This increased the chance of revealing vulnerabilities in low- level components (such as in the Linux kernel, core libraries or the Dalvik virtual machine). Moreover, several vulnerabilities were identified in the Android permission mechanism which greatly increases the risk of malware infection. The researchers proposed several security mechanisms that can mitigate these high- risk threats. It is highly important to incorporate a mechanism, such as the SELinux access control system, that can prevent potential damage resulting from an attack on the Linux kernel layer. Also, better protection should be added for strengthening the Android permission mechanism and for detecting the misuse of granted permissions. The authors subsequently gave highest priority to such things as the SELinux tools, a firewall, Intrusion Detection System, Automated Static Analysis and Code Verification and the Context Aware Access Control solutions. They placed Data Encryption and the Selective Android Permission systems lower down the list of priorities. Source: http://arxiv.org/ftp/arxiv/papers/0912/0912.5101.pdf Unsecured Android MOBILE SECURITY Dennis Fisher is Technology Evangelist for Kaspersky Lab’s US Office. Source: http://threatpost.com/en_us/blogs/large-ddos-attacks-still-serious-problem-011110 THREATS THE EXPERTS COMMENT
  • 4. NEWS www.secureviewmag.com6 |SECUREVIEW 3rd quarter 2010 NEWS www.secureviewmag.com 3rd quarter 2010 SECUREVIEW |7 An international group of scientists has demonstrated the possibility of stripping away the anonymity from significant numbers of users of popular social networking sites. Any technology allowing the identification of users of social networking sites, the collection of data about their habits and the prediction of their behavior can be used to cause harm. For example, such data can reveal a user’s sexual habits, or render somebody open to blackmail. But despite the fact that this threat is well known, very little has been done to prevent it. The researchers demonstrated the possibility of this type of attack by identifying a user who was simply browsing the web. An attacker can probe the victim’s browser history for any URLs that may reveal membership of any social networking groups. By combining this information with previously collected data it is possible to identify any user of a social network who happens to visit the attacker’s website. In many cases, this allows the attacker running the malicious website to uniquely identify his visitors by the names which they use in their corresponding social networking profiles. This type of attack requires very little effort to carry out and has the potential to affect many millions of registered social networking users who have group memberships. The non-profit Cloud Security Alliance has published a report defining the foremost cloud security threats. Cloud computing is a kind of distributed system whereby all computer resources are provided to the users in the form of Internet services. As the technology becomes more and more popular, criminals use it to improve their reach, avoid detection and increase the effectiveness of their activities. Enterprise and home users need to better understand the risks associated with the adoption of cloud computing. The authors of the report identified the following seven threats: 1. Abuse and nefarious use of cloud computing Providers of infrastructure as a service offer their customers the illusion of unlimited compute, network and storage capacity, often coupled with a frictionless registration process where anyone with a valid credit card can register and immediately begin using cloud services. Some providers even offer free limited trial periods. By abusing the relative anonymity behind these registration and usage models, spammers, malicious code authors and other criminals have been able to conduct their activities with relative impunity. 2. Insecure Application Programming Interfaces Cloud computing providers expose a set of APIs that customers use to manage and interact with cloud services. Provisioning, management, orchestration and monitoring are all performed using these interfaces. The security and availability of general cloud services is dependent upon the security of these basic APIs. 3.Malicious insiders This threat is amplified for consumers of cloud services by the convergence of IT services and customers under a single management domain, combined with a general lack of transparency into provider process and procedure. 4. Shared technology vulnerabilities Cloud computing vendors deliver their services in a scalable way by sharing infrastructure. Often, the underlying components that make up this infrastructure were not designed to offer strong isolation properties for a multi-tenant architecture. To address this gap, a virtualization hypervisor mediates access between guest operating systems and the physical compute resources. Still, even hypervisors have exhibited flaws that have enabled guest operating systems to gain inappropriate levels of control or influence on the underlying platform. 5. Data loss/leakage The threat of data compromise increases in the cloud. Examples include insufficient authentication, authorization or audit controls, operational failures and data center reliability. 6. Account, service & traffic hijacking Cloud solutions add a new threat to the landscape. If an attacker gains access to your credentials in the cloud, they can manipulate data, eavesdrop on your activities and transactions, return falsified information and redirect your clients to illegitimate sites. Your account or service instances may become a new base for the attacker. From here, they may leverage the power of your reputation to launch subsequent attacks 7. Unknown risk profile One of the ideas of Cloud Computing is the reduction of hardware and software ownership and maintenance to allow companies to focus on their core business. This has clear financial and operational benefits, which must be weighed carefully against the contradictory security concerns — complicated by the fact that cloud deployments are driven by groups who may lose track of the security ramifications. As the authors stressed, the threats described are not listed in order of severity. Dangerous Clouds SECURITY THREATS Risky Communication SOCIAL NETWORKING Source: http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf Over the last few months there have been quite a few news reports about Banker Trojans emptying the online bank accounts of small businesses in the U.S. The MitE Banker Trojans reached its peak of ‘maximum sophistication’ back in 2007. This specific subset of Banker Trojans was - and still is - extremely sophisticated and will exploit bank-specific vulnerabilities in the implementation of two- factor authentication. A lot of banks still don’t employ two-factor authentication for making transactions. Or, when they do, it’s a very weak form of two-factor authentication. Secure online banking requires multi-factor authentication. The authentication code needs to be received or generated on a device which is not connected to the device that’s doing the transaction. Ideally, not only should the transaction authorization code be generated dynamically, but also the password for logging onto the banking site. One thing to bear in mind here is that the cryptographic response algorithm needs to be different for logging on and approving transactions. The solution to this huge problem is actually quite simple. Make the receiving bank account number a part of the authentication process. Either send the number by SMS, or use it as an (additional) challenge when using a token. The user knows where the money is supposed to go. What we also need to bear in mind is that since 2006/2007, a lot has changed. The average piece of malware has become a lot more sophisticated. Form grabbers, for example, are pretty much standard. In fact, we live in an age where Microsoft decided to pull a patch because of problems which turned out to be caused by the extremely advanced TDSS rootkit. This means that we need online systems in place that are resilient to such powerful malware. The state of online banking in some ways resembles that of the Internet. For many banks, online banking was not directly designed with proper safety in mind. Convenience is the major driver. The Internet was built on very much the same principles. I’d argue that solving the online banking problem is an infinitely easier task than fixing the fundamental weaknesses in the infrastructure of the Internet. Here’s How to Fix Online Banking Fraud Roel Schouwenberg is a Senior Antivirus Researcher for Kaspersky Lab’s Global Research & Analysis Team. Source: http://threatpost.com/en_us/blogs/heres-how-fix-online-banking-fraud-022510 ONLINE THREATS THE EXPERTS COMMENT According to estimates by Team Cymru Research, the number of botnets controlled by http- channels has doubled during the past half year. American researchers associate that tendency with the widespread availability of ready- made kits for cyber-attacks. Additionally, the very user-friendly interfaces play a significant role in allowing those without and any specialist skills and knowledge to operate http-botnets. According to the results of their research, the number of botnets exploiting IRC-traffic remains unchanged. Most of their command and control centers are situated in the USA and Western Europe. The USA aside, many http-botnet owners take advantage of hosting-services provided by the BRIC countries (except India). They are apparently attracted by the fact that the financial situation and rapidly- growing economic development in China, Russia, and Brazil means that those governments cannot make sufficient resources available for fighting cybercrime. Source: http://www.team-cymru.org/ReadingRoom/Whitepapers/2010/ developing-botnets.pdf Transition to http In an undercover mission to learn more about the size and scope of the son of the infamous Storm botnet, Waledac, German researchers have discovered the spamming botnet is much larger and more efficient than previously thought. The team from the Universities of Mannheim and Vienna boldly infiltrated the Waledac botnet from 6 Aug to 1 Sept of last year using a cloned Waledac bot that they built and code- named “Walowdac.” They found Waledac runs a minimum of 55,000 bots a day, with a total of 390,000 bots - much larger than the previous estimates of 20,000 or so bots. The researchers were also able to measure the success rates of various spam campaigns launched by Waledac, and were able to observe up-close Waledac’s newer features, such as its ability to steal credentials from bot-infected machines. The German researchers calculated from their research that Waledac could theoretically send more than 1.5 billion spam messages per day, and that’s actually a conservative estimate, they said in their report (PDF) on the experiment. Waledac changes its malware variants approximately every two weeks the researchers observed, and the U.S. is home to the majority ofthebotsandrepeaters,with 17.34 percent of the spamming bots and 19.5 percent of the repeaters. It was also discovered that around 90 percent of the Waledac bots were 32-bit XP machines. BOTNETS Source: http://www.darkreading.com/security/vulnerabilities/showArticle. jhtml?articleID=222200371 Child of Storm Botnet ‘Waledac’ Is Expansive Source: http://www.iseclab.org/papers/sonda-TR.pdf
  • 5. NEWS www.secureviewmag.com8 |SECUREVIEW 3rd quarter 2010 NEWS www.secureviewmag.com 3rd quarter 2010 SECUREVIEW |9 Have you ever found a false positive when uploading a file to a website like VirusTotal? Sometimes it happens that not just one scanner detects the file, but several. This leads to an absurd situation where every product which doesn’t detect this file automatically looks bad to users who don’t understand that it’s just false positives. Sadly you will find the same situation in a lot of AV tests, especially in static on-demand tests where sometimes hundreds of thousands of samples are scanned. Naturally, validating such a huge number of samples requires a lot of resources. That’s why most testers can only verify a subset of the files they use. Since good test results are a key factor for AV companies, this has led to the rise of multi-scanner based detection. Naturally AV vendors, including Kaspersky Lab, have been scanning suspicious files with each others’ scanners for years now. Obviously knowing what verdicts are produced by other AV vendors is useful. This is why a German computer magazine conducted an experiment along these lines, and the results of this experiment were presented at a security conference last October. The experimenters created a clean file, asked us to add a false detection for it and finally uploaded it to VirusTotal. Some months later this file was detected by more than 20 scanners on VirusTotal. After the presentation, representatives from several AV vendors at the event agreed that a solution needed to be found. However, multi-scanner based detection is just the symptom not the cause - the root of the problem is the test methodology itself. Improving test methodologies was also the reasons why two years ago a number of AV companies (including Kaspersky Lab), independent researchers and testers founded AMTSO (Anti-Malware Testing Standards Organization). We decided to illustrate the problem during our recent press tour in Moscow where we welcomed journalists from all around the world. Naturally the goal was to highlight the negative effect of cheap, static on-demand tests. What we did pretty much replicated what the German computer magazine did last year, only with more samples. We created 20 clean files and added a fake detection to 10 of them. Over the next few days we re-uploaded all twenty files to VirusTotal to see what would happen. After ten days, all of our modified (but not actually malicious) files were detected by up to 14 other AV companies - in some cases false detection was probably the result of aggressive heuristics, but multi-scanning obviously influenced some of the results. We handed out all the samples used to the journalists so that they could test it for themselves. So where should we go from here? The good news is that in the last few months, some testers have already started to work on new testing methodologies. Instead of static on-demand scanning they try to test the whole chain of detection components: anti-spam-module -> in the cloud protection -> signature based detection -> emulation -> behavior-based real- time analysis, etc. Ultimately of course, it’s up to the magazines to apply this type of test and to abandon approaches that are simply outdated and outmoded. If we get rid of static on- demand tests with their mass of invalidated samples, the copying of classifications will at least be significantly reduced, test results will correspond more closely to reality (even if that means saying good bye to 99.x% detection rates) and in the end everyone will benefit: the press, the users and of course us as well. MALWARE TESTING THE EXPERTS COMMENT According to a poll by Sophos, the amount of spam and harmful messages on social networks has increased by 70% during the last 12 months. By the end of the year more than five hundred organizations had taken part in the poll. Some 57% of corporate users said that they had received spam whilst visiting social networking sites, 36% reported harmful programs and 30% suffered phishing attacks. Of the participants polled, 72% expressed awareness that the irresponsible use of social networks by employees could pose a significant risk to corporate security, with 60% of the criticism being directed towards Facebook. It is clear that of all of the social networking websites available in the west, Facebook has the largest number of members. According to Sophos, most of the social networking providers are much more interested in increasing their market share than they ever are in the question of protecting their users from cybercrime. It seems paradoxical then that half of the respondents (13% more than last year) allow their personnel to visit Facebook from their place of work without the imposition of any restrictions. Experts continue to mention that although LinkedIn (A social network allowing users to seek out useful business contacts) is not believed to be a direct danger to corporate business, personal information published on that server may be of a great value to the cybercriminals. It is because it is used mostly by professionals that LinkedIn could easily become some sort of directory of companies’ personnel resources which may provide information for targeted cyber-attacks. On the Way to Better Testing The Expansion of Internet Dangers Source: http://www.sophos.com/pressoffice/news/articles/2010/02/ security-report-2010.html SOCIAL NETWORKSSECURITY THREATS The shorter and more simplistic a password is, the more susceptible it will be to basic, brute force password attacks. This in turn leaves the users’ data vulnerable and hackers are rapidly adopting ever more smart brute force password cracking techniques. Despite this however, users continue to choose very weak passwords. The Imperva Application Defense Center has analyzed the strength of many user passwords. The results of the investigation have been published in their ‘Consumer Password Worst Practices’ report. The key findings of the report are: • About 30% of users chose weak passwords the length of which was equal to, or below, six characters • Almost 60% of users chose their passwords from a limited range of alpha-numeric characters • Nearly 50% of users chose names, slang words, everyday words or passwords using such easily-guessed constructions as consecutive digits and adjacent keyboard keys, for example’123456’, ‘12345’, ‘123456789’ and ‘Password’. It is recommended that users: 1. Choose a strong password for sites that store personal information that they value highly. Bruce Schneier’s advice is useful. He says: “Take a sentence and turn it into a password. Something like “This little piggy went to market” might become “tlpWENT2m”. That nine-character password won’t be in anyone’s dictionary. 2. Use a different password for each site – even for the ones where privacy isn’t an issue. To help remember the passwords, again, following Bruce Schneier’s advice is recommended: “If you can’t remember your passwords, write them down and put the paper in your wallet. But just write the sentence – or better still – a hint that will help you to remember your sentence”. 3. Never trust a third party with your important passwords (webmail, banking, medical etc.). It is recommended that administrators should: 1. Enforce a strong password policy – if you give the users a choice, it is very likely that they will choose weak passwords. 2. Make sure passwords are not transmitted in clear text. Always use https for logins. Make sure passwords are not stored in clear text. Always encrypt passwords before storing them in a database. 3. Employ aggressive, anti- brute force mechanisms to detect and mitigate brute force attacks on login credentials. It makes brute force attacks too prolonged to serve any practical purpose, even against shorter passwords. You should actively put obstacles in the way of a brute-force attacker – such as CAPTCHAs and computational challenges, etc. 4. Employ a password change policy. Trigger the policy either according to a predetermined schedule, or immediately when suspicion of a compromise arises. 5. Allow and encourage passphrases instead of passwords. Although sentences may be longer, they may be easier to remember. With added characters, they become more difficult to break. Very Weak Passwords are Still Very Popular Source: http://www.imperva.com/docs/WP_Consumer_Password_Worst_ Practices.pdf The French government has suggested an initiative to replace all user passwords with a single digital certificate that provides access to all of the nation’s web services. According to the project’s authors, the introduction of a universal identifier or ‘IdeNum’ as it would be known, could put an end to the tiresome necessity of memorizing a huge number of difficult alpha-numeric and symbol combinations that are supposed to provide security when surfing the web. According to statistics provided by Trusteer, 73% of those polled admitted that they use their bank passwords for entering other online services as well. The integration of an IdeNum system would make the authorization process shorter for users of any private or public resources participating in the scheme and would also automate the process of completing online forms. The multi-functional identifier could be kept on a separate device, which may be a flash, smart, or SIM-card. At present, more than 20 national institutes including The Union of French bankers, The Association of Insurance Companies and the French postal service have all expressed their readiness to take part in the research. A prototype of the authentication system is planned to be unveiled by the middle of this year, followed by the introduction of a fully-functional system in 2011. The lifespan of a digital certificate will probably be limited to between 3 and 5 years. There is no doubt that the realization of such a difficult project will take a lot of resources and financing. This is in large part due to the fact that the system of authentication must not only certify the users’ identity, but must also ensure that data security is maintained as well. That last issue becomes more and more relevant due to the appearance of banking Trojans. These are able to intercept transactions in real-time and change the information therein without being noticed by any of the participants. Protecting digital certificates from theft is a serious challenge. That “Key to the Kingdom” will surely become the ultimate prize for those whose hunting domain is the Internet and whose prey is the funds of the unwary. DIGITAL CERTIFICATES Source: http://countermeasures.trendmicro.eu/french-government-to-bid- adieu-to-online-passwords/ Farewell to a Thousand-and- One Passwords? Magnus Kalkuhl is a Senior Virus Analyst for Kaspersky Lab’s Global Research & Analysis Team Source: http://threatpost.com/en_us/blogs/way-better-malware-testing-020110
  • 6. REPORT | Infosecurity Europe 2010 www.secureviewmag.com10 |SECUREVIEW 3rd quarter 2010 Infosecurity Europe 2010 | REPORT www.secureviewmag.com 3rd quarter 2010 SECUREVIEW |11 Nigel Stanley, Practice Leader of IT Security at Bloor Research said, “As an analyst I feel that Infosecurity Europe is the most important event of the year. It’s here that you meet with the manufacturers and get to know about all the latest industry trends. For me, it is certainly time well spent.” That the event draws such large numbers of visitors and manufacturers is due to both the professionalism of Claire Sellick, Event Director for Infosecurity Europe, and the greatly increased threat levels existing in the field of IT security these days. After several years of relative stagnation, British firms are now facing a punishing new wave of cyberattacks, the impact of which is estimated to be in excess of £10 billion [Sterling] per year. “This raises awareness of IT security management quite considerably,” Sellick is convinced. OPENING KEYNOTE TARGETS DATA LOSS In his keynote address, David Smith, Deputy Commissioner for the Information Commissioner’s Office (ICO) painted the following picture: “In little more than two years, 960 instances of data loss were recorded, that averages out to about 30 per month,” said Smith. According to his information, the UK’s National Health Service (NHS) alone accounted for about 30 percent of the total. He believes that “It is very probable that in the nearest future it will be a legal requirement in the United Kingdom to notify the authorities of any data losses” Even a study by Pricewaterhouse Coopers had little to report that offered any hope. A worrying 92 percent of all large enterprises suffered a security incident or data loss last year. The study, ‘A Survey of Information Security Breaches’ found that cybercriminals were themselves becoming increasingly organized along traditional business lines and this is driving a demand from industry for adequate means of protection. However, many enterprises remain woefully unprepared or only partially ready to meet the incumbent threat. For many visitors to Info Security 2010, the workshops on offer were the real highlight. The organizers divided the event into three sections: keynotes, business strategy and technology. The business strategy presentations earned consistent praise. With their limited duration of 45 minutes they were ideally suited to visitors who wanted to grab as much information as possible in a short space of time. The audience very much appreciated the fact that the sessions were not usurped for the purposes of marketing and sales. Ian Mann’s talk on Social Engineering came in for particularly high praise. The author of ‘Hacking the Human’ provided several amusing anecdotes in which he explained why the human animal sitting in front of the screen is the biggest security risk for most companies. EUGENE KASPERSKY ENTERS THE IT HALL OF FAME Much applause was also heaped upon the keynote ‘Cyber Warfare - War Stories from the Front Lines’. The long queues outside the entrance were a surefire indication that something special was about to take place there. What the two speakers, Marc Kirby and Sean Hanna, subsequently delivered was probably the most entertaining and exciting event of Infosecurity Europe 2010. Eugene Kaspersky, CEO of Kaspersky Labs also took to the stage to share his vision of what the future might hold in terms of IT technologies. According to Eugene, in the future the smartphone will be king, with everybody owning and using one. Kaspersky, who during Infosec 2010 was inducted into the Hall of Fame, stated emphatically that the world will see an explosion in the development of hardware and software for smartphones. “I believe that in the nearest future, smartphones will have enough memory and computing power to hold all our personal data, as well as movies, pictures and other information.” He stated. “There will be no reason to use a computer any more. Why would you? All you need is a keyboard, a screen and a network connection.” Such a revolution would increase the attacks on mobile devices considerably. However, these are far easier to protect against due to the centralized nature of the providers’ infrastructure. As evidenced by the continuing increase in visitor and exhibitor numbers, Infosecurity Europe is very much on the right track. Claire Sellick sees the growing success of the event as being due to companies realizing that IT security is now as essential prerequisite for new and profitable products and services. Events like this that bring together suppliers and customers so that each may appreciate the wishes and expectations of the other will no doubt shape the future of the IT industry. Sellick stated that 82 percent of the stands available for Infosecurity Europe 2011 have already been booked. RE CONCEPT: EXHIBITION AND LECTURES As they have in previous years, the organizers of Infosecurity 2010 pursued a two-tier approach. The central exhibition hall was the venue for the exhibiting companies, with booths designed to allow visitors and company representatives to hold discussions away from all the hustle and bustle. Both sides, exhibitors and visitors, rated the layout very highly. Nina Malchus, Director of Publishing for SecuMedia and a regular at the event gave her impression of the exhibition hall: “The hall is very busy and makes a big impression on the visitor. There is an awful lot to see, observe and experience, but it’s possible to get round everything in a good day.” David Tomlinson, Managing Director of Data Encryption Systems was similarly impressed. “Our booth was visited by many visitors who were very keen to do business. The event is an ideal place to meet new clients.” Analysts confirm that impression. There was no mistaking the result of this particular match: Infosecurity Europe 1 - Ash cloud 0! Despite all the disruption to the airspace over Europe, the UK’s most important security event, now in its 15th year, drew in a record number of exhibitors and visitors. Over 12,500 eager attendees turned up to take advantage of what was on offer from the event’s 324 exhibitors. Many of the visitors were drawn by the quantity of very well-known and respected speakers delivering the keynote speeches and holding workshops, not to mention the fact that a number of companies chose the event to make some pretty major announcements. Among them were Symantec who announced the purchase of encryption company PGP and GuardianEdge for a cool $370 million [US]. Two lectures in particular garnered a great deal of attention: Pricewaterhouse Coopers (PwC) announced the results of their study on data loss, whilst David Smith, Deputy Commissioner for the Information Commissioner’s Office (ICO), announced tougher penalties for the loss of customer data. Security defies the ash clouds The Infosecurity Europe 2010 event attracted a huge number of visitors despite the chaos to European airspace caused by the eruption of the Icelandic volcano. This year the focus was on data loss, Cloud Security and Web 2.0. There were very many popular exhibition stands at this year’s event, but the thing that really seemed to pull in the crowds were the various workshops and presentations that covered everything from the latest industry technologies through to business strategy. Elmar Török has been working in the IT-Industry since 1989. He became an author and technical journalist in 1993 while studying electrical engineering in Munich and Kempten. Since then he has written hundreds of articles for just about every major computer and networking publication in Germany. Elmar specialises in IT-Security and storage issues, has a solid knowledge of server-related topics and knows his way around virtualization. He is the Editor-in- Chief of the security periodical “Infodienst IT-Grundschutz” and is involved in the final acceptance process of new material for the IT- Grundschutz Catalogues of the Federal Office for Information Security. Article by Elmar Török Earls Court: The Place to be for Infosecurity Europe 2010 Where Products and News Abound: Companies present their wares in the exhibition hall David Smith, Deputy Commissioner for the Information Commissioner’s Office during his keynote
  • 7. TOP STORY | Keyloggers www.secureviewmag.com12 |SECUREVIEW 3rd quarter 2010 Keyloggers | TOP STORY www.secureviewmag.com 3rd quarter 2010 SECUREVIEW |13 □ A keylogger can be an espionage device when installed onto a rival’s system by a competitor. • Keyloggers can be used by private detective agencies, special services and criminal organizations as a means of spying on users. • Keyloggers can be part of a malware program and can be used for the detection of passwords, credit card numbers and other such important information. This type of keylogger can operate automatically, becoming active only when certain application windows or websites are open. When a keylogger is employed by a cybercriminal it becomes a very significant threat to the user, as most importantly, it allows the acquisition of a user’s passwords which then provide unauthorized access to the user’s email, social networking and online bank accounts. THE LIFECYCLE OF A KEYLOGGER Just as with any spyware, the lifecycle of a keylogger consists of three main stages: 1. System penetration. This operation can be performed manually and it is typical for the majority of commercial keyloggers. To do this the cybercriminal needs remote or local access to the PC. The second variant is the installation of a keylogger with the help of programs such as Trojan-Dropper and Trojan-Downloader. It is very common knowledge that a lot of Trojan samples contain keylogger functionality built in for the purposes of spying on users, usually for the harvesting of passwords or credit card numbers. 2. Spying on users. During this process it is very important for the keylogger to remain undetected, and several methods exist to achieve this. 3. Passing the collected data to the cybercriminal. This process is greatly simplified where the criminal has access to the target PC. When access does not exist, commercial keyloggers offer a rich choice of possibilities. Data can be sent via email, passed over a network, or downloaded from an FTP server. SOFTWARE KEYLOGGERS The general modus operandi of a keylogging program is that it is loaded onto a PC where it resides quietly and monitors keyboard inputs, whilst at the same time performing a range of accompanying tasks such as avoiding detection and passing on any collected protocols and data etc. There are a large number of free commercial keyloggers available, as well as specialized catalogue sites containing the results of keylogger tests and their descriptions. A perfect example of such a resource can be found at: http://www.keylogger.org Keyloggers that operate according to the interrogation cycle principle This type of keylogger is the simplest of all and is based on the system of assigning a number of API-functions to the applications for interrogating the keys on the keyboard. For example, the GetAsyncKeyState function shows whether the named key is pressed or released, and GetKeyboardState returns an array of 256 elements with the state of each key on the keyboard, but works only with GUI applications. This method is very simple to perform and undetectable as there is no embedding of DLLs or hardwired installation, however for better results it is necessary to use high speed interrogation, in the order of no less than 10-20 polls per second, otherwise data can be missed. Countermeasures: Detecting cyclic interrogation in itself is not difficult. The main problem is how to tell whet her it is a keylogger or a legitimate program doing The first Keyloggers appeared a very long time ago. During the MS DOS era at the end of the 80s and the beginning of the 90s there were a huge amount of keyloggers about, most of which were written in assembly language and used the INT9h interrupt and INT16h capture. Along with the development and distribution of Windows came the Windows keyloggers. Their creation was made simpler by the fact that the Windows GUI already included a standard keyboard event capture mechanism and keyloggers based on this system where very simple and contained no more than thirty to fifty lines of code. Additionally, such Windows features as multitasking and multi-window applications interfaces have made the spies’ task wider. In order to simplify protocol analyses, today’s data spies have to determine to which window and which particular application an input belongs. They can track a user’s Internet activity, trace IM correspondence, take screenshots of the display and the active windows and perform a whole host of similar nefarious actions, right up to secretly activating the microphone and webcam. As a result, the majority of modern keyloggers could more accurately be described as ’universal loggers’ or ‘universal spies’. It should be noted that most modern keyloggers will actively disguise their presence on a system, usually with the help of rootkit technologies. THE PURPOSE OF KEYLOGGERS AND THEIR FIELDS OF APPLICATION The main purpose of any keylogger is to secretly record all of the keystrokes made by the user. The recorded information usually relates to whatever is happening in the active window. It is important for protocol analysis as a Windows user may randomly change the active window a number of times. Another thing that has to be borne in mind when working with text in present- day applications is the possible use of the Windows clipboard. Thus a keylogger has to keep track of the clipboard contents and incorporate it into the protocol when a ‘paste’ command is detected. The protocol recorded during a keylogging session then has to be analyzed either automatically or by the person who installed the keylogger for the purposes of recovering the desired data. Typically this will include passwords, account and credit card login credentials or specific behavior, such as the entry of data into a password field or form on a given website. Statistically keyloggers are more often than not used as follows: • Domestic usage: parents spy on children; husbands and wives spy on each other, etc. In this situation we are talking about the home PC, where installing a keylogger and analyzing its protocol is relatively easy. • In a business environment keyloggers can be used for different tasks: □ It can be used by an insider as an instrument to secretly spy on their colleagues. The worst scenario is when the insider is a member of the IT department, which allows them to install a keylogger on a user’s computers and gain access to the recorded data later on without any problems. □ A security department may install keyloggers to spy on users for any number of reasons. The detection of improper PC use, the collection of data in internal investigations, the monitoring of users correspondence and IM traffic, etc. Skeleton Keys The ability to monitor what a PC user does on their computer is of great interest to the cybercriminals, primarily for the purposes of espionage and the stealing of passwords, but it can also be a positive thing, assisting with legitimate tasks such as managing staff productivity and protecting a company from the unwanted disclosure of information. It has long been understood that where demand exists, supply is sure to follow, and thus the market is rich in espionage technologies, of which some are free and others are not. The largest demand within this market is for keyloggers. Oleg joined Kaspersky Lab in 2007 as a Developer in the Complex Threat Analysis Group. He was promoted to Technology Expert in November 2008 and is responsible for carrying out research into new detection and disinfection technologies, investigating and disinfecting remote systems and analyzing the behavior of malware. Article by Oleg Zaitsev Chief Technology Expert at Kaspersky Lab SpyAgent allows you to monitor virtually everything users do on your computer Antivirus programs, for example Kaspersky Internet Security 2010, react unequivocally to cyclic interrogation from the hidden window
  • 8. TOP STORY | Keyloggers www.secureviewmag.com14 |SECUREVIEW 3rd quarter 2010 Keyloggers | TOP STORY www.secureviewmag.com 3rd quarter 2010 SECUREVIEW |15 procedure for every IRP of the IRP_ MJ_READ type. The keylogger does this with the help of the API function IoSetCompletionRoutine. During the termination procedure the keylogger has to analyze the received keystroke data and then enter it into the protocol or transfer it to the User Mode component for further analyses and recording. • Substitution of the system keyboard driver with the keylogger driver. • The use of rootkit technologies. This approach equates to a User Mode rootkit keylogger and can intercept PeekMessage in win32k.sys functions by means of searching for and modifying their addresses in the system table KeServiceDescriptorTableShadow. Countermeasures: Preventing kernel- mode keyloggers is more difficult as an application that installed its own driver can control the system. However it is possible. As a minimum, antivirus programs can block the installation of unidentified drivers, especially if it is a hidden installation. Additionally, interception analyses are possible (for the detection of rootkit-keyloggers) as well as analyses of the chain of keyboard driver driver-filters. HARDWAREKEYLOGGERS A hardware keylogger is a device that performs the logging of keystroke information and is hardware-based and does not rely on the installation of any software. The main danger of the hardware keylogger is that it makes it impossible to detect the keylogger using an antivirus or antikeylogger solution. Additionally, some types of hardware keyloggers do not even require a physical connection to the PC at all. By its principle of operation and information acquisition methods, the hardware keyloggers can be classified according to several categories. Connected to the keyboard Often these keyloggers are connected to the keyboard interface cable. They are universal and usually connected without the need to cut any cables. Generally, these keyloggers take the form of a miniature device with a PS/2 or USB input connector for connection of the keyboard and an output connector for connection to the PC. Because of its miniature size, a keylogger is often disguised as something familiar to the user, for example, a ferrite filter for the suppression of electromagnetic interference, or a converter of some description. The advantage of this type of keylogger is that its connection requires literally only a few seconds and this operation can be performed by unqualified staff, for example, a cleaner. Such keyloggers accumulate recorded data on their internal flash memory (This is the classic solution. The amount of memory can vary from around 2 Megabytes up to a few Gigabytes), or they can transfer the data via a radio link, for example with the help of Wi-Fi or Bluetooth. It is important to note that keyloggers such as this may contain custom programs too, for example, to carry out audio recording. These keyloggers draw their power directly from the PC. At the present moment hardware keyloggers cost around $200-400. A number of companies have set up production lines for their manufacture. There are keyloggers that sit inside the keyboard or system block. This type the polling, for example, a computer game. Typically, the approach used is that if an application window is open, visible and remains as the input focus – it is considered that such a poll is legitimate. When the window is minimized or another application window has the input focus – then such behavior is considered suspicious and is usually automatically blocked. Keyloggers working as traps Keyloggers based on a trap mechanism (Hook) are considered the classic method for the creation of keyboard spyware and this approach is well documented and works only for GUI applications. Traps allow the keylogger not to trace the keystrokes themselves, but to track messages that are processed in the windows of other GUI applications. The hook handling code has to be placed in a DLL, with installation and removal of the hooks being performed with the help of the API functions SetWindowsHookEx, for installation of the hook, and UnhookWindowsHookEx for removal of the hook. When SetWindowsHookEx is being called, the type of message is specified as one of the parameters for which the hook handler should be called; in particular WH_KEYBOARD is designated for the logging of keyboard events and WH_MOUSE for mouse events. The hook can be installed for a particular flow or for all of the flows in the system. From a technical point of view, after registration of the hook the following happens: after the GUI application receives the first message that meets the conditions for hook activation, the DLL containing the hook code is loaded into the process’ address space. After that the hook code receives full privileges. Countermeasures: The hook’s installation is not hard to detect and block with the help of a behavioral analyzer; also it is not difficult to study the behavior of the hook code and its reaction to a keyboard input. The main problem is how to tell the difference between a keylogger and a legitimate program, for example, a keyboard format switcher. Rootkit-keyloggers This is relatively rare, but one of the most dangerous keyboard spies. Its principle of operation is based on its ability to capture any set of functions responsible for message processing or processing of the inputted text. In the simplest case, this method is based on the capture of the GetMessage, PeekMessage and TranslateMessage library User32.dll functions, which allows the monitoring of any messages received by the GUI applications. The danger of this keylogger is that interception can be carried out with the help of various methods, the set of captured functions are not known in advance. ‘Targeted capture’ is possible when the capture code is inserted only into specific applications and only under certain circumstances, for example, when a password input window is displayed. Another dangerous feature of the rootkit keylogger is that virtual keyboards cannot provide protection from them. Countermeasures: The embedding of the capture code is a potentially dangerous and suspicious action, which is why it can be detected and neutralized by antivirus programs during penetration and at the stage of heuristic checking, for example, during emulation before launch. Kernel-mode keyloggers Spyware of this class are based on the following three principles: • Installation of a driver-filter for the keyboard driver. The method of writing these drivers has been documented, for example, it is possible to find relevant information in the DDK (Driver Development Kit) on the Microsoft website (article ID 176417) as well as an example, Ctrl2Cap, on http:// www.sysinternals.com. After loading, the spyware must connect to the keyboard driver stack with the help of the IoCreateDevice and IoAttachDevice functions. The important point is that the driver-filter will not register IRPs (I/O Request Packets) with data about keystrokes, but IRPs with requests for data from the Kbdclass driver. Information about keystrokes will be available from the moment that the Kbdclass driver finishes the IRP and transfers the requested data to the IRP buffer. Therefore the keylogger filter has to install its own terminationAVZ Analyzer is able to describe keylogger behavior in detail Modern hardware keylogger is not hard to make The principle of operation of the UserMode keylogger is quite simple Examples of commercial hardware keyloggers Corporate keyloggers Separate mention should be made of that specialized category of keyboard spies - keyloggers for the corporate network. As a rule, they contain a means for their automatic centralized installation and online management and can be integrated with the domain controller and the personnel record databases. The transmission of data from such a keylogger on the management server can be in real-time. The keylogger’s controller is also placed on the server as well as the database for the accumulation of any results and the analysis tools necessary to examine the collected data. Analysis, as a rule, takes the form of searches for passwords and expressions and input data on the frequency and densities of the detection of the assigned samples. One additional interesting feature of similar keyloggers is the system’s reaction to specific patterns of behavior - for example, the input of a company’s accounting data into an open SAP R3 window is considered a normal action, the input of the same data into the ICQ window causes the system to react immediately by notifying the company’s security services.
  • 9. TOP STORY | Keyloggers www.secureviewmag.com16 |SECUREVIEW 3rd quarter 2010 Keyloggers | TOP STORY www.secureviewmag.com 3rd quarter 2010 SECUREVIEW |17 of keylogger is more difficult to detect, but naturally, it is more difficult to install. Usually it is installed in the same way as a classical keylogger, but inside the keyboard rather than in line with its cable. It is possible to use a specially designed frameless model of keylogger that was created specifically for embedding, or to create your own basic keylogger, as can be seen at: http://www.keelog. com/diy.html which is based on the AT89C2051microcontroller. Using this chip, even a schoolboy with an elementary knowledge of electronics can manufacture their own keylogger. Additionally, some companies produce keyboards with keyloggers already built in which are indistinguishable from normal ones. (See: http://www.keelog.com/usb_hardware_ keylogger.html). Countermeasures: It is very difficult to protect against hardware keyloggers as they are almost undetectable using software tools. The word ‘almost’ is used here as hardware keyloggers contain software components that interface with the hardware. As for the rest, the protection measures available are pretty low-tech and include protecting keyboard frames by using labels and seals along the assembly joints, the placing of sticky labels on the points of connection of the cables to the system block and sealing the system block itself. Keeping a label log and doing periodical label audits is then necessary. Keyloggers operating without connection to the keyboard This type of keylogger is much more exotic than the rest and is utilized when the acquisition of immensely desirable information is required and when it is not possible to use commercially produced hardware solutions. Essentially, these keyloggers capture the secondary electromagnetic radiation emanating from keyboards and their associated cabling. The main problem with using these keyloggers is that the secondary radiation coming from a keyboard is of such low signal strength that it is difficult to pick up from a long way away. The task is even more difficult to perform in a room where there are several computers, each with identical keyboards. However, stories about the successful capture of data from distances of 10-20 meters as well as about the development of such equipment appear in the popular press from time to time. For example, the article http://lasecwww.epfl.ch/keyboard/ even contains a video demonstration of just such a process. Countermeasures: Countermeasures are common for Secondary Electromagnetic Radiation and Induction (SERI). Screening and good earthing decrease the level of SERI and special disturbance generators make it significantly more difficult for cybercriminals to intercept and identify any useful information. Another well known method is simpler to perform and based on the capture and analysis of the sound produced by the individual keystrokes. Scientists from the University of Berkeley in California carried out significant amounts of research in this field and in their results published in 2005 they showed that it is possible to recognize between 60 and 90% of keystrokes using ordinary sound recording techniques. Countermeasures: The main method of protection in this case is to advise personnel of the risks and explain that inputting their password when a mobile phone is on the table nearby is not the best way to ensure security. Secretly observing input This method becomes more and more topical because of the fact that modern portable autonomous video recorders are no larger than a box of matches in size and come in many guises: watches, pens, lighters, packs of cigarettes, car alarm/ locking fobs, calculators, organizers and other small devices that do not attract any special attention. The criminal can ‘accidentally’ leave such a recorder on somebody’s table and come back to pick it up a couple of hours later. It is important to say that just a few years ago this type of devices could only be seen in spy movies, now they are being manufactured commercially. Therefore it is not unusual to come across such devices in the hands of the cybercriminals. They range in price from $100 to $400. Such devices are mainly used in the corporate sphere, where the probability of commercial espionage is quite high. Countermeasures: The main method is to train and instruct personnel that there should be no unauthorized devices at their workstation and particularly in the vicinity of the screen and keyboard, especially those left by ‘forgetful’ visitors. PROTECTIVE MEASURES As you already know, there is a large number of keyloggers of different types, each with its own set of dangers. Let’s have a look at the main universal methodologies that can be used to combat keyloggers. It is important to note that maximum effect is achieved when a combination of the measures discussed are used. Antivirus products An antivirus solution offers a minimum of two lines of protection, signature detection and detection by the various heuristic procedures which analyze the behavior of the application. It should be noted that signature detection is not very effective for a number of reasons, the two most basic being: • The standard keylogger is extremely simple in design and can be written by a student in 1-2 days (plus on the Internet there are many complete source codes available). Consequently, the signature detection of such home-made keyloggers will be relatively ineffective; • Strictly speaking the keylogger is not a harmful program. It can be a commercial application with a license agreement and an installer and the detection of this application is not entirely warranted, especially if we are talking about a corporate product; Accordingly, heuristic analysis on the basis of emulation data or behavioral analysis for example, is not subject to the drawbacks mentioned above. Virtual keyboard Virtual keyboard is an application (either stand-alone or part of a protection package), intended for emulation of the keyboard. The keys of the virtual keyboard are pressed with the help of a mouse. Generally, use of a virtual keyboard makes it possible to evade all forms of hardware keyloggers as in this case, the normal keyboard is not used. However, it does not provide protection from many software-based keyloggers and other espionage measures, such as the taking of screenshots. However, antivirus or anti-keylogger virtual keyboards will activate a number of additional measures to enhance protection, such as blocking traps, the prevention of screenshots and other similar activities. The range and type of these countermeasures are specific to each product. Password Managers A password manager is an application which contains a database of the user’s login credentials. Generally the database will be encrypted and a master password known only to the user is required for access to and decryption of the database’s contents. Sometimes biometric authorization or a USB-token can serve as a password. The benefit of password managers is that passwords are not entered manually each time, which completely excludes their interception by all forms of hardware and software keyloggers. Rejecting the usual passwords and PIN codes The means of protection described above can be supplemented with the following methods, which guarantee an additional level of safety. • The use of code tables. A code table is a normal table, which can be stored in the form of a picture or printout and contains X times Y number of cells. Generally anything from 10 x 10 to 16 x 16 is used. A table is generated by the server and a copy is sent to the user for printing (or a copy is sent via registered post). When carrying out the authorization process the user is prompted to enter the contents of certain cells selected at random by the server. This process can either take the place of a password or can be in addition to it. It can be seen that the interception of a specific combination will make it possible to learn the value of two or three cells from the possible hundred-plus and that during subsequent authorization sessions, other cells will be requested. However, the keylogger is unable to fix the requested cells position - and so the criminals will not know which cells were involved without resorting to taking a screenshot. The benefit of this method lies in its simplicity. Similar technology is used by the Russian payment transfer system Yandex Money. • Use of one-time passwords. This method is similar to the previous one, but in this case the user receives a table of one-time passwords, and once used, that password is then crossed out. The method can be used in reverse, with the user removing the opaque protective coating from a sequential password list printed on a card. In this method the danger of password interception with the aid of a keylogger is completely avoided. However, the quantity of passwords is limited and it will be necessary to obtain a new list at some point. • Use of a password generator. An electronic token is used for the generation of passwords, the generated passwords are not repeated and they are produced according to a specific algorithm. It is considered that the algorithm and the secret key within cannot be deciphered based on just a few intercepted passwords. • Adopting two-factor authorization, for example, with the use of an eToken. In this case the theft of passwords is not dangerous, since it is useless without the accompanying token. The reverse also applies. The eToken is useless without the password. CONCLUSION Thus we have examined the basics of software and hardware keyboard spies. In summing up it is worthwhile mentioning that the situation in this area of technology is changing radically by the day. Two or three years ago hardware keyloggers were some sort of techno-marvel, now they are produced commercially with many different models available, beginning with the basic 32 KB types, right up to devices with several GB of memory and wireless control. It should be assumed that the development of the hardware keylogger market will continue and possibly in the very near future we will see an entirely new generation of ‘software-hardware spies’ which will not require access to the victim’s computer at all. RE Kaspersky Internet Security 2010’s virtual keyboard prevents the taking of screenshots A spy pen with an embedded video camera and recorder for 3 hours of continuous recording can ‘accidentally’ be placed on the Director’s desk if his company is under attack from commercial spies Wireless keyboards - convenience for the user or paydirt for the spy? The developers of wireless devices usually employ a standard interface for the transmission of data (most frequently Bluetooth), or use their own bespoke system of wireless connection, integrating a transceiver into the keyboard, connected to the USB or PS/2 socket. In both cases, information is broadcast about which keys have been pressed and this can be intercepted by a cybercriminal. Unfortunately, the protection algorithms employed in these circumstances often does not provide guaranteed security. As a result, it was only matter of time before the ‘radio sniffer’ and ‘wireless keylogger’ was sure to appear. Moreover, one of the most well known practical manifestations is freely available at http://www.remote-exploit. org/Keykeriki.html. A keylogger can be installed inside a keyboard without it being noticeable
  • 10. ANALYTICS | Internet fraud www.secureviewmag.com18 |SECUREVIEW 3rd quarter 2010 3rd quarter 2010 SECUREVIEW |19www.secureviewmag.com Internet fraud | ANALYTICS AMERICAN PROTOTYPE Those websites offering audio drugs contain an explanation that “Audio drugs have only appeared in Russia quite recently. They were developed by American scientists and are in great demand on the local market”. This statement is disputable as this product has never been heard of in the US, at least in the form that was used for selling it in Russia. It is necessary, however, to make one exception here. Back in 1980 The American Monroe Institute did popularize binaural waves as a means of beneficially influencing the human psyche. They sold tens of thousands of records and influenced others to produce records and generators of allegedly binaural signals that claimed to produce effective synchronization of brain waves. At the peak of the popularity of binaural rhythms in the US, a special I-Doser program was created which became the prototype for ‘audio drugs in MP3 format’. I-Doser was supposed to induce an effect analogous to audio drugs – to cause sensations, states of mind, emotions imitating the effects of various chemical drugs, etc. The program had the binaural rhythms theme right at its heart. Obviously I-Doser was sold online, but the program itself was free of charge and the download also contained a few melodies. The program gained a certain popularity in the US and some European countries, but certainly wasn’t the fireworks party that the creators had hoped for. The absence of any wide-scale promotional campaign didn’t help either, and nearly all the users who tried the program left feedback about the lack of any effect at all, not even a headache, caused by using the program. Thus, the popularity of this new product in the US and Europe quickly subsided, but the idea itself continued to live on in the minds of the ‘social engineers’. EXPANSION EASTWARD At first the fraudsters decided to look to the east – Korea and China. Audio drugs appeared there around the end of 2008 and the beginning of 2009. In these countries the social engineers copied the general concept of I-Doser, offering downloads of audio files for money that could then be listened to with the assistance of special programs. However, later on the situation was considerably simplified for these and many other Asian websites with the appearance of audio drugs in the popular MP3 format. Those websites that were offering audio drugs in China and Korea stated that the product appeared first in Italy. Instructions for the usage of the files were close to the Russian version in many instances (‘put on your headphones, close your eyes, relax…etc’) but the principle of action was described in maybe a little more details. The cost of one ‘narcotic’ track started at around $3, but many users uploaded tracks that they had purchased to their blogs, which others then downloaded for free. On the one hand this led to the rapid spreading of ‘audio drugs’ among Korean and Chinese users. On the other, the largest part of the information about ‘audio drugs’ available on the Internet was not of a commercial nature, but rather contained the opinions of those that had experimented with the new product. But the party ended as quickly as it started – by summer when the audio narcotic wave hit Russia, those in China had already recognized that the phenomenon was nothing more than another fraudulent attempt to part fools from their money and any mention of it practically disappeared from the newspapers and blogs overnight. ARRIVAL IN RUSSIA In June, when audio drugs were first launched onto the Russian Internet, the sellers started to operate according to their old ways, with mass spam mailings sent via instant messaging programs, social networks and email. Such mailings went on for the entire year, but the effect from the very first wave of spam was such that within the first week the need to advertise was negated – news of the audio drugs had started spreading via word of mouth. Thus by 01 June, Yandex’s “pulse of the blogosphere“ peaked with a total of 94 mentions of audio drugs, sound drugs and electronic drugs. In any case, every website offering narcotics was stuffed full of feedback from supposed clients who’d already experienced the sensation. Sure enough, all of the comments were not just positive, but highly enthusiastic. Sometimes though the site’s authors took it too far and enthusiasm turned into something quite farfetched and absurd. On top of that, ghost-users would often pop up on message forums, or they would create a blog and add lots of people as friends, in order to share the supposed ‘euphoria’ that they had gained from using the electronic marihuana. Against a background of such powerful advertising by the sellers, messages coming from real users stating “I spent money, downloaded an audio drug, listened to it and got nothing at all from it” or “All I got was a migraine” were largely ignored by everyone except the friends of the user. At worst, even the users’ friends passed it off as “It’s all right, it’s nothing unusual. Some feel it while others don’t.” The instructions given to the users by the suppliers stated that any users wanting to experience the sensation for themselves only needed a player, some SCIENTIFIC APPROACH During 2009, the social engineering fraternity put their dubious talents to work advertising a very interesting ‘invention’ - ‘audio drugs’. More precisely, they used their talents slightly earlier, inventing the whole concept themselves and then building the websites to fit their rather twisted purpose. So, what on earth are ‘audio drugs’? The answer to that question is available on any website that sells ‘audios’, the now-common slang word for these drugs. According to one site: “Audio drugs are files which imitate, during the listening process, the effects of popular drugs, or heighten sexual feelings or produce any altered states or moods by using the binaural effect”. The binaural effect is the ability of a human or animal to locate an object through the use of sound emanating from the object. The ability to do this is simply due to each of us possessing two audio receivers – our ears. So what the peddlers of this material are telling us is that the effect of popular drugs can be synthesized using sound. As part of their ‘completely scientific’ explanation of these audio drugs, some websites mention the principle of ‘binaural rhythms’ or ‘binaural waves’. Those rhythms are a bit more complex, as one website explains: “Binaural rhythms are two tones which vary slightly in frequency, each tone being delivered separately, one to each ear. This way, the rhythms are perceived as being formed inside your head”. Without going into details, it’s quite possible that those rhythms are really being used in sound drugs. But not in quite such a simplistic way… Research shows that binaural rhythms do not synchronize brain waves at all. But the creators of the websites claim that they do, and that this is what causes the range of feelings that the user is supposed to experience. The ability of those kinds of rhythms to produce a relaxing effect has been common knowledge for a long time already. It is used, in particular, in special music designed for meditation purposes due to its calming effect. Actually, that kind of reaction has far more to do with a repetitious binaural rhythm. Everybody knows, for example, that it is easy to fell asleep listening to the clickety-clack of a train’s wheels– repeating a binaural rhythm is the same thing. The question as to whether and how such monotonous binaural rhythms produce the sexual effects claimed by the website owners remains open however. Now that we’ve got to the bottom of what ‘binaural’ really means, let’s move on and take a look at how the creators presented their product to us: “Audio drugs don’t damage your body and won’t turn you into an addict, but they do have a relaxing effect on your body, giving you all the feelings that you get using real drugs, but without the harmful side-effects”. In general, this part corresponds to the ideas about using binaural rhythms in music for meditation – which too is believed to have a positive influence on the body. What isn’t so clear, however, is how it’s supposed to leave you feeling ‘positive and relaxed’ as real drugs can do, albeit synthetically. Additionally, the authors of the websites promise us auditory and visual hallucinations. It’s no secret that hallucinations are not in any way associated with a healthy mind. So, can audio drugs ‘positively’ cause psychological problems? What about the warnings on the websites saying “We do not recommend that people with existing psychological problems listen to binaural waves as it could exacerbate their condition.” So, a relaxing effect that damages your mind – that sounds a little strange. The Sound of Deception Are you afraid of something? Do you have hopes and dreams? Got any complexes? Are you a curious person? If the answer is ‘yes’ to any of those questions, then you are a potential victim of the so-called ‘Social Engineers’. These ‘social engineers’ use their advanced knowledge of the psychological weaknesses of humans to lever unwary users into sending them login credentials for their social networking accounts, give them access to their PC’s, or to unwittingly ‘share’ the use of their credit card. Additionally, social engineering is used for the shrewd placement of product advertisements designed to generate income for the spammers in the future. The fraudsters didn’t stint on creating attractive, good-looking advertising for their websites Maria has worked for Kaspersky Lab since August 2008, firstly as a Junior Spam Analyst, then rising to become one of the Company’s fully-fledged Spam Analysts. Her main duties include the analysis of German-language spam, completing monthly analytical spam reports and participating in the many Kaspersky Lab educational initiatives. Article by Maria Namestnikova Spam Analyst at Kaspersky Lab
  • 11. www.secureviewmag.com20 |SECUREVIEW 3rd quarter 2010 ANALYTICS | Internet fraud 3rd quarter 2010 SECUREVIEW |21www.secureviewmag.com Internet fraud | ANALYTICS stereo headphones and a mobile phone. Wait a minute…What’s a mobile phone for? To pay for the product of course! To receive a narcotic track a user sends an SMS to a four or five-digit number and then enters the code they receive into a special field, which is not an unusual way of doing things in Russia. RUSSIA CAN’T BE UNDERSTOOD.... So, what was the net effect of audio drugs on the Russian Internet? It was – it has to be said, overwhelming. Just a couple of weeks after they appeared, the young and progressive Internet community no longer considered audio drugs a sensation. Some tried it and leant their expert opinion of the experience to the knowledge-hungry public, whilst others were keen to try it, but backed off again on the grounds of health concerns, and yet another group were conceptually against drugs as a phenomenon overall, including audio drugs in particular. Those hearing this word combination for the first time became more and more rare. In blogs, forums and chats audio drugs became the hottest topic around. Unfortunately it was teenagers who happened to make up the main part of the electronic drug barons’ target audience, and as is well known, teenagers are fairly easily persuaded to try new things, regardless of their parents’ advice to the contrary. Tell the younger generation who have just entered the so-called ‘awkward age’ that smoking is cool and predictably– half the school will be hiding from the teachers and having a cigarette. They do it to demonstrate the “I am cool” message to others. The same goes for audio drugs. Whether it was part of the ‘engineers’ plan or just happenstance, who knows, but the major part of their Russia audience turned out to be between 13 and 16 years old. Teenagers tried the audio drugs just so that they could turn up at school with the appearance of being a sophisticated drug user and report on their “sensational” experience. Also discussions seen on some teenagers’ forums often used another very appropriate word - ‘autosuggestion’. This is another vulnerability that the ‘social engineers’ exploited. In other words, those ‘sophisticated drug users’ of 13-16 years old often did really believe that they ‘got a kick’ from what they listened to. They convinced themselves that they had had all the sensations that they believed a person should experience having used one of the more well-known drugs. So by listening to monotonous binaural rhythms they only managed to get excited and hyped up instead of calming down and relaxing. However the desire to look cool in front of one’s peers and the attraction to forbidden fruits are simple human vices, characteristic not only of teenagers, but adults as well. It cannot be forgotten either that many people, when hearing the words ‘audio drugs’, would have felt curiosity and a desire to try something new, thus we can state with confidence that the ‘social engineers’ received quite a wide audience ready to pay for their ‘engineering miracles’. Ostentatious pseudo-science also helped the criminals not by chance, but in strict accordance with their plans. The bait was swallowed not only by schoolchildren, students and ordinary Internet users, but also journalists, including those working in big news and analytical web publications. It’s interesting to note that the majority of publications, especially in the first two months, did not try to understand the deeper nature of this phenomenon, nor did they try to explain to their readers what audio drugs really were. Most articles published during July and August were based on the information provided by the websites distributing the electronic drugs, and the majority of user reviews in the publications were just the usual crop of very artificial ‘bait’-type materials which the ‘social engineers’ had placed on the Russian Internet themselves. The only threat presented to the readers of those publications was the line that audio drugs couldn’t be any more dangerous than traditional chemical ones. The first articles that brought people round to believing that audio drugs were nothing more than simple fraud appeared only at the end of summer, after an article called “Attention! A new kind of fraud” was published on the website of the Interior Ministry on 27 August. Unfortunately by that time “A new kind of fraud” was not new anymore and it was quite difficult to convince many people of it. In a few months after the appearance of ‘the miracle’ on the Russian Internet, it attracted the attention of the authorities of some regions. On 23 September 2009 in St.Petersburg, audio drugs were treated almost the same as pornography and their distribution among the under-aged strictly forbidden. As was announced by the Kommersant- SPB newspaper (№ 177 (4232) of 24.09.2009)”…trading in such products is banned within a radius of 150 meters from child-care and educational facilities, including high schools and universities” The loud noise in the press also played right into the hands of the criminals distributing the stuff. The scare-mongering titles of the Internet newspapers and independent analytical articles only attracted more of the curious to it. The ‘social engineers’ themselves started to use ’scandal’ topics to attract attention to their product. “Danger: audio drugs can be downloaded for free!”, “Audio drugs affect brains” and “Audio drugs in MP3 format cause harm” – screamed the subject line of one of the posts on a popular blogging resource. However, the same post then went on to say that audio drugs are “cool” and provided links to some respective sites where one could find one’s own proof. THECROPISGATHEREDIN Audio drugs as we all know only too well were very successful for the ‘social engineers’. Certainly, behind all the noise and doubts about ‘High – or no high’, ‘Harmful – or not harmful’ there lies a simple thirst for profit. The abundance of similarly-styled websites appearing en-masse on the Internet at the time were nothing more than the fruits of partner program activity. It’s well recognized that many of the participants of partner programs certainly don’t hide their activities and openly share their impressions of their associations with all and sundry. It was thus in a blog on one of the partner program websites during mid-July that the following information appeared. “As far as audio drugs go – when it was new the theme was great! I tried this theme a month ago and very quickly hit 100K Roubles a day! The author goes on to describe in detail which tools were used to promote it on which websites, before eventually admitting to making “20-60 of Dollars per day”. So popular has this theme proved, that cybercriminals were willing to shovel money at it, whilst journalists, deputies and simple users continued their ideological disputes about whether audio drugs were harmful or not. SOMETHING NOVEL? By the autumn of 2009, largely due to the recession, the fever had died down. It was time for the social engineers’ to come up with their next big thing and it needed to be bigger and better than their previous brainchild. This time it wasn’t long in the making, driven by their urge to earn big bucks. Adding a new twist to their previously successful scam, they introduced ‘Stereohypnosis’ and to make sure everyone knew about their latest novelty, they spammed just as many as they could by every available means. The theme of audio drugs undoubtedly had become very noticeable very quickly. Despite that, it was already possible to search Google and find websites offering video files for download which supposedly acted on the subconscious, this time, by means of ‘stereohypnosis’. The name has become more lengthy and complex if you notice. ‘Social engineers’ have long continued to play up the pseudo- scientific nature of their ‘inventions’. With stereohypnosis they went one step further, making it better and more interesting- sounding than plain old audio drugs. An explanation consisting of scientific terms and offering descriptions of its principles lends itself as well to the electronic page as it does to the printed page. Exactly as with the audio drug websites, stereohypnosis it was claimed, caused altered states of consciousness– from offering relaxation after a long day’s work, to the heightening of sexual stimulation. Among the many websites offering various methods to heighten sexual sensations it’s not difficult to find many selling ‘A stereo version of viagra‘. Creditable reviews from those exalting the power of hypnosis have long since appeared on numerous web pages and websites, and in abundance on the websites distributing ‘stereohypnosis’. CONCLUSION Whatever they do, there are large doubts that the ‘social engineers’ will repeat their earlier triumphs, advertising got underway at the beginning of March and since then there’s been a distinct lack of noise from either the electronic mass-media or the Internet communities. It seems to prove that the spam mass- mailings were not as effective as in the past and that the ‘social engineers’ may have miscalculated. Firstly, over the past few months many people have started to associate payment by SMS-messaging to short numbers with being ripped off. Secondly, ‘stereohypnosis’ does not actually offer anything new under the sun, and besides, the similarities of the websites just reinforce peoples’ feelings of distrust, not to mention the statement itself, ‘Safe Drugs’ proving an oxymoron for just too many. RE Some Russian spam simply contained a link for users to click on, without even mentioning the product in the text Stereohypnosis’ – the next big thing for the gullible The Chinese press was quick to pick up on the topic of audio drugs The I-Doser program was even available as an iPhone app!
  • 12. ANALYTICS | Vulnerabilities in Adobe Software www.secureviewmag.com22 |SECUREVIEW 3rd quarter 2010 Vulnerabilities in Adobe Software | ANALYTICS www.secureviewmag.com 3rd quarter 2010 SECUREVIEW |23 A day later, Jeremy Conway, a Researcher and Product Manager with NitroSecurity, demonstrated a way to copy the embedded executable from one PDF file to another using Adobe Reader, opening up the possibility of a PDF worm. It's a beautiful target, if you want to do some damage, Conway says. I don't know of any target larger than Acrobat Reader. Welcome to Adobe's world. The popularity of the portable document format has made Adobe's Reader and Acrobat top targets of researchers' and attackers' efforts to find and exploit any application flaws. The company's other ubiquitous platform, Flash, has attracted similar attention from attackers focused on exploiting victims through the web. Typical attacks either focus on the browser or popular browser extensions, such as Flash Player. In that bucket, Flash is at the top of the list, says Michael Sutton, Vice President of Research for web security firm Zscaler. The attention of attackers spells out a big problem for Adobe. Last year, Adobe Acrobat and Reader became the No. 1 target among flaw finders focused on file-format vulnerabilities. While attackers and researchers ramped up research on Microsoft Office starting in 2006, the number of vulnerabilities disclosed in Office formats peaked in 2008. Now, Adobe Acrobat and Reader are the top targets. Last year, researchers found 48 vulnerabilities in Acrobat and 38 in Reader. Security issues in Office had dropped to 35. The trend looks likely to continue this year, with Adobe's two products on track to see more flaws and Microsoft Office less. UNDER ATTACK It's not only researchers that have taken a greater interest in Adobe products. Malicious emails using Adobe's PDF format account for 61 percent of all the targeted attacks seen so far in 2010, according to antivirus firm F-Secure. Overall, targeted attacks are set to double this year, according to Sean Sullivan, a Security Advisor with the company's North American Labs. We are seeing a higher percentage of attacks using PDFs and more attacks as well, Sullivan says. Attackers also have Adobe's Flash platform in their sights. In the last half of 2008, a vulnerability in Flash Player became the most exploited browser security issue, according to Microsoft's Security Intelligence Report. In the first half of 2009, the most recent data available, the trend continued with 17.5 percent of browser-based exploits attacking one flaw in Adobe's Flash Player. The trend comes as no surprise. Over the last decade, researchers have moved away from finding operating systems vulnerabilities and focused instead on applications, where flaws are easier to find. Applications now make up the vast majority of vulnerabilities. Jeff Williams, Principal Group Program Manager for Microsoft's Malware Protection Center, told Threatpost in a statement. The increased attention has put Adobe products and their development process in the spotlight. Microsoft found itself in a similar position a decade ago. In 2001, the double tap of the Code Red and Nimda worms, which exploited a handful of flaws in Microsoft products, led to the company creating its Strategic Technology Protection Program and to CEO Bill Gates' decision to turn the Microsoft juggernaut around and focus on security. The company did not have a chance to lose its resolve either. The spread of Slammer in 2003 led to Microsoft committing to improving the quality of its patches and simplifying its autoupdate process. Two months after that, MSBlast infected millions of Windows PCs, prompting Microsoft to focus its next service pack for Windows XP on security. Microsoft climbed that learning curve ahead of other vendors, says Zscaler's Sutton. Adobe is definitely on that slope – again, because they had to be. There is a negative reputation that the security in Reader and Flash are in need of improvement. FROM REACTION TO ACTION For Adobe, the turning point came in 2008. While Microsoft and its Office applications continued to take the brunt of researchers' and attackers' efforts to find flaws in file formats, the number of vulnerabilities disclosed in Acrobat and Reader had hit an all time high. Revamping the company's approach to security became a top priority at Adobe. In August 2008, the company hired Brad Arkin – a former manager from Symantec and @Stake – to head efforts to secure their products. In December, the company opened up communications with the security community with a statement simply titled: We care. It is very clear to Adobe that we are receiving increased attention from the security community, Peleus Uhley, a Senior Security Researcher at the firm, wrote in the blog post at the time. Adobe has been responding to this increased attention over the course of the last year by proactively investing in both internal and external security measures to further protect our customers. As part of its efforts, about half the company has gone through a security When security consultant Charlie Miller decided to look for vulnerabilities in popular file types, selecting the portable document format was a no-brainer. Something like 90 percent of computers have Adobe Reader on them, he says. These are programs that are ubiquitous in use, but have a track record of security problems on them, and that makes them interesting. Miller found that a fairly dumb script that tries different combinations of PDF file inputs can cause a large number of possibly-exploitable crashes in Adobe Reader and Apple's Preview PDF viewer. Miller, a Principal Consultant at Independent Security Evaluators, is not alone in his interest. A week after Miller's presentation, researcher Didier Stevens reported that the warning message displayed by the command for launching external applications from Adobe's Reader and Acrobat could be modified, allowing malicious applications to be run from a single PDF file with a watered-down warning message. The Downside of Ubiquity Three years ago, attackers favored Microsoft Office as their vector of choice for compromising systems. Now, Adobe’s products are under the microscope. Adobe created webpage that contains important information regarding security vulnerabilities that may affect specific versions of Adobe products and solutions National Vulnerability Database statistics data 0 15 30 45 60 2004 2005 2006 2007 2008 2009 Vulnerabilities Disclosed Microsoft Office Adobe Acrobat Adobe Reader Adobe Flash Player Robert Lemos is a veteran technology journalist of more than 13 years, focusing on computer security, cybercrime, and enterprise issues. Mr. Lemos spent eight years as a staff writer at ZDNet News and as a senior staff writer at CNET News. com, which purchased ZDNet in 2000. He acted as editor-at-large for SecurityFocus, a security news and information site owned by Symantec Corp., from April 2005 to August 2009, providing daily independent journalism and investigative articles covering security incidents, malicious code, vulnerabilities and cybercrime. Article by Robert Lemos