STE WILLIAMS

A Closer Look at CIA-Linked Malware as Search for Rogue Insider Begins

Symantec researcher explains the goals behind CIA-linked hacking tools, as the government launches an investigation to discover who gave secret documents to WikiLeaks.

The CIA and FBI reportedly have launched a joint investigation to discover who leaked thousands of confidential documents that contained descriptions of hacking tools used by the CIA to break into computer systems, smartphones, and smart televisions.

Sources close to the investigation say US intelligence agencies are hunting a CIA employee or contractor with physical access to the documents, which were stored in a “highly secure” agency division, according to CBS News, which broke the story on this latest development.

In March, WikiLeaks publicly disclosed documents it claims it received from a former US intelligence contractor. The files, collectively named Vault 7, included information on zero-day vulnerabilities for Windows, Android, and iOS, as well as exploits against routers and smart TVs.

Shortly after the WikiLeaks dump, cybersecurity firms connected the Vault 7 documents with a cyberespionage group known for targeting governments and private companies with a variety of tools. Each company has a different nickname for the group, which many believe to be the CIA.

Kaspersky Lab calls the group the Lamberts and claims its tools target Windows and Max OS devices. Symantec calls it Longhorn and says it exclusively attacks Windows targets.

Symantec started looking into these tools three- to four years ago, says Vikram Thakur, principal research manager at Symantec Security Response.

Thakur in an interview shared details of some of the tools Symantec discovered in its research on Longhorn’s capabilities, how they are different, and their goals for targeting victims. The hacking tools target specific organizations and also give the attacker full access to communicate with users, he says.

“These tools are primarily backdoors with different capabilities,” he explains. “They allow the attacker to ask any and all commands to the end user.”

None of the tools discovered were used for mass surveillance, but for observing activity and gathering information from particular organizations. It’s difficult to know what the specific commands were for, but Thakur says they were not being used to activate microphones and listen to conversations. They were looking for information: documents, meeting notes, and intellectual property.

“Some people might write malware with the intention of collecting hoards of information. This was not that type,” says Thakur.

At the start of Symantec’s Longhorn research in 2014, Plexor was the first particular threat to appear, Thakur says. At the time, the Trojan had only been seen on several Windows machines within one organization. Plexor contained information on the network architecture specific to the victim business, and would arrive via embedded Word document in a spearphishing email.

The team then unearthed Longhorn 1, which shared code with Plexor but had a “completely different toolset,” he continues. Each sample of the Longhorn malware had a different set of keywords, but version numbers (3.5, 3.6, etc.) indicated it was part of an organized pattern.

Longhorn 2, another tool associated with the group, was discovered when his team was hunting for additional samples of Longhorn 1 in the wild. It’s similar to the first version but has different functionality and lesser capabilities, says Thakur. Both were built to communicate with a specific command and control server, unique to the sample and victim.

Corentry is the next evolution in Longhorn’s toolset. Like Longhorns 1 and 2, it’s a backdoor designed to monitor activity and collect information, and it shares similar code and techniques to the other two tools.

While the organization using these tools was “extremely organized and driven by process,” there was overlap in the use of these malware tools.

“We can see on a timeline that none of these tools were exclusively used at any point in time,” says Thakur. This is a sign that multiple people were using the same code against a handful of organizations around the world at the same time, he says.

The tools were mostly used in countries “that we would consider of national interest,” he continues, though he can’t speak to specific countries or businesses. There was one instance in which a Corentry file infected a machine in the US, but it was quickly uninstalled, indicating it may have been launched by mistake.

Related Content:

Kelly Sheridan is Associate Editor at Dark Reading. She started her career in business tech journalism at Insurance Technology and most recently reported for InformationWeek, where she covered Microsoft and business IT. Sheridan earned her BA at Villanova University. View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/a-closer-look-at-cia-linked-malware-as-search-for-rogue-insider-begins/d/d-id/1328710?_mc=RSS_DR_EDT

A Closer Look at CIA-Linked Malware as Search for Rogue Insider Begins

Symantec researcher explains the goals behind CIA-linked hacking tools, as the government launches an investigation to discover who gave secret documents to WikiLeaks.

The CIA and FBI reportedly have launched a joint investigation to discover who leaked thousands of confidential documents that contained descriptions of hacking tools used by the CIA to break into computer systems, smartphones, and smart televisions.

Sources close to the investigation say US intelligence agencies are hunting a CIA employee or contractor with physical access to the documents, which were stored in a “highly secure” agency division, according to CBS News, which broke the story on this latest development.

In March, WikiLeaks publicly disclosed documents it claims it received from a former US intelligence contractor. The files, collectively named Vault 7, included information on zero-day vulnerabilities for Windows, Android, and iOS, as well as exploits against routers and smart TVs.

Shortly after the WikiLeaks dump, cybersecurity firms connected the Vault 7 documents with a cyberespionage group known for targeting governments and private companies with a variety of tools. Each company has a different nickname for the group, which many believe to be the CIA.

Kaspersky Lab calls the group the Lamberts and claims its tools target Windows and Max OS devices. Symantec calls it Longhorn and says it exclusively attacks Windows targets.

Symantec started looking into these tools three- to four years ago, says Vikram Thakur, principal research manager at Symantec Security Response.

Thakur in an interview shared details of some of the tools Symantec discovered in its research on Longhorn’s capabilities, how they are different, and their goals for targeting victims. The hacking tools target specific organizations and also give the attacker full access to communicate with users, he says.

“These tools are primarily backdoors with different capabilities,” he explains. “They allow the attacker to ask any and all commands to the end user.”

None of the tools discovered were used for mass surveillance, but for observing activity and gathering information from particular organizations. It’s difficult to know what the specific commands were for, but Thakur says they were not being used to activate microphones and listen to conversations. They were looking for information: documents, meeting notes, and intellectual property.

“Some people might write malware with the intention of collecting hoards of information. This was not that type,” says Thakur.

At the start of Symantec’s Longhorn research in 2014, Plexor was the first particular threat to appear, Thakur says. At the time, the Trojan had only been seen on several Windows machines within one organization. Plexor contained information on the network architecture specific to the victim business, and would arrive via embedded Word document in a spearphishing email.

The team then unearthed Longhorn 1, which shared code with Plexor but had a “completely different toolset,” he continues. Each sample of the Longhorn malware had a different set of keywords, but version numbers (3.5, 3.6, etc.) indicated it was part of an organized pattern.

Longhorn 2, another tool associated with the group, was discovered when his team was hunting for additional samples of Longhorn 1 in the wild. It’s similar to the first version but has different functionality and lesser capabilities, says Thakur. Both were built to communicate with a specific command and control server, unique to the sample and victim.

Corentry is the next evolution in Longhorn’s toolset. Like Longhorns 1 and 2, it’s a backdoor designed to monitor activity and collect information, and it shares similar code and techniques to the other two tools.

While the organization using these tools was “extremely organized and driven by process,” there was overlap in the use of these malware tools.

“We can see on a timeline that none of these tools were exclusively used at any point in time,” says Thakur. This is a sign that multiple people were using the same code against a handful of organizations around the world at the same time, he says.

The tools were mostly used in countries “that we would consider of national interest,” he continues, though he can’t speak to specific countries or businesses. There was one instance in which a Corentry file infected a machine in the US, but it was quickly uninstalled, indicating it may have been launched by mistake.

Related Content:

Kelly Sheridan is Associate Editor at Dark Reading. She started her career in business tech journalism at Insurance Technology and most recently reported for InformationWeek, where she covered Microsoft and business IT. Sheridan earned her BA at Villanova University. View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/a-closer-look-at-cia-linked-malware-as-search-for-rogue-insider-begins/d/d-id/1328710?_mc=RSS_DR_EDT

A Closer Look at CIA-Linked Malware as Search for Rogue Insider Begins

Symantec researcher explains the goals behind CIA-linked hacking tools, as the government launches an investigation to discover who gave secret documents to WikiLeaks.

The CIA and FBI reportedly have launched a joint investigation to discover who leaked thousands of confidential documents that contained descriptions of hacking tools used by the CIA to break into computer systems, smartphones, and smart televisions.

Sources close to the investigation say US intelligence agencies are hunting a CIA employee or contractor with physical access to the documents, which were stored in a “highly secure” agency division, according to CBS News, which broke the story on this latest development.

In March, WikiLeaks publicly disclosed documents it claims it received from a former US intelligence contractor. The files, collectively named Vault 7, included information on zero-day vulnerabilities for Windows, Android, and iOS, as well as exploits against routers and smart TVs.

Shortly after the WikiLeaks dump, cybersecurity firms connected the Vault 7 documents with a cyberespionage group known for targeting governments and private companies with a variety of tools. Each company has a different nickname for the group, which many believe to be the CIA.

Kaspersky Lab calls the group the Lamberts and claims its tools target Windows and Max OS devices. Symantec calls it Longhorn and says it exclusively attacks Windows targets.

Symantec started looking into these tools three- to four years ago, says Vikram Thakur, principal research manager at Symantec Security Response.

Thakur in an interview shared details of some of the tools Symantec discovered in its research on Longhorn’s capabilities, how they are different, and their goals for targeting victims. The hacking tools target specific organizations and also give the attacker full access to communicate with users, he says.

“These tools are primarily backdoors with different capabilities,” he explains. “They allow the attacker to ask any and all commands to the end user.”

None of the tools discovered were used for mass surveillance, but for observing activity and gathering information from particular organizations. It’s difficult to know what the specific commands were for, but Thakur says they were not being used to activate microphones and listen to conversations. They were looking for information: documents, meeting notes, and intellectual property.

“Some people might write malware with the intention of collecting hoards of information. This was not that type,” says Thakur.

At the start of Symantec’s Longhorn research in 2014, Plexor was the first particular threat to appear, Thakur says. At the time, the Trojan had only been seen on several Windows machines within one organization. Plexor contained information on the network architecture specific to the victim business, and would arrive via embedded Word document in a spearphishing email.

The team then unearthed Longhorn 1, which shared code with Plexor but had a “completely different toolset,” he continues. Each sample of the Longhorn malware had a different set of keywords, but version numbers (3.5, 3.6, etc.) indicated it was part of an organized pattern.

Longhorn 2, another tool associated with the group, was discovered when his team was hunting for additional samples of Longhorn 1 in the wild. It’s similar to the first version but has different functionality and lesser capabilities, says Thakur. Both were built to communicate with a specific command and control server, unique to the sample and victim.

Corentry is the next evolution in Longhorn’s toolset. Like Longhorns 1 and 2, it’s a backdoor designed to monitor activity and collect information, and it shares similar code and techniques to the other two tools.

While the organization using these tools was “extremely organized and driven by process,” there was overlap in the use of these malware tools.

“We can see on a timeline that none of these tools were exclusively used at any point in time,” says Thakur. This is a sign that multiple people were using the same code against a handful of organizations around the world at the same time, he says.

The tools were mostly used in countries “that we would consider of national interest,” he continues, though he can’t speak to specific countries or businesses. There was one instance in which a Corentry file infected a machine in the US, but it was quickly uninstalled, indicating it may have been launched by mistake.

Related Content:

Kelly Sheridan is Associate Editor at Dark Reading. She started her career in business tech journalism at Insurance Technology and most recently reported for InformationWeek, where she covered Microsoft and business IT. Sheridan earned her BA at Villanova University. View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/a-closer-look-at-cia-linked-malware-as-search-for-rogue-insider-begins/d/d-id/1328710?_mc=RSS_DR_EDT

A Closer Look at CIA-Linked Malware as Search for Rogue Insider Begins

Symantec researcher explains the goals behind CIA-linked hacking tools, as the government launches an investigation to discover who gave secret documents to WikiLeaks.

The CIA and FBI reportedly have launched a joint investigation to discover who leaked thousands of confidential documents that contained descriptions of hacking tools used by the CIA to break into computer systems, smartphones, and smart televisions.

Sources close to the investigation say US intelligence agencies are hunting a CIA employee or contractor with physical access to the documents, which were stored in a “highly secure” agency division, according to CBS News, which broke the story on this latest development.

In March, WikiLeaks publicly disclosed documents it claims it received from a former US intelligence contractor. The files, collectively named Vault 7, included information on zero-day vulnerabilities for Windows, Android, and iOS, as well as exploits against routers and smart TVs.

Shortly after the WikiLeaks dump, cybersecurity firms connected the Vault 7 documents with a cyberespionage group known for targeting governments and private companies with a variety of tools. Each company has a different nickname for the group, which many believe to be the CIA.

Kaspersky Lab calls the group the Lamberts and claims its tools target Windows and Max OS devices. Symantec calls it Longhorn and says it exclusively attacks Windows targets.

Symantec started looking into these tools three- to four years ago, says Vikram Thakur, principal research manager at Symantec Security Response.

Thakur in an interview shared details of some of the tools Symantec discovered in its research on Longhorn’s capabilities, how they are different, and their goals for targeting victims. The hacking tools target specific organizations and also give the attacker full access to communicate with users, he says.

“These tools are primarily backdoors with different capabilities,” he explains. “They allow the attacker to ask any and all commands to the end user.”

None of the tools discovered were used for mass surveillance, but for observing activity and gathering information from particular organizations. It’s difficult to know what the specific commands were for, but Thakur says they were not being used to activate microphones and listen to conversations. They were looking for information: documents, meeting notes, and intellectual property.

“Some people might write malware with the intention of collecting hoards of information. This was not that type,” says Thakur.

At the start of Symantec’s Longhorn research in 2014, Plexor was the first particular threat to appear, Thakur says. At the time, the Trojan had only been seen on several Windows machines within one organization. Plexor contained information on the network architecture specific to the victim business, and would arrive via embedded Word document in a spearphishing email.

The team then unearthed Longhorn 1, which shared code with Plexor but had a “completely different toolset,” he continues. Each sample of the Longhorn malware had a different set of keywords, but version numbers (3.5, 3.6, etc.) indicated it was part of an organized pattern.

Longhorn 2, another tool associated with the group, was discovered when his team was hunting for additional samples of Longhorn 1 in the wild. It’s similar to the first version but has different functionality and lesser capabilities, says Thakur. Both were built to communicate with a specific command and control server, unique to the sample and victim.

Corentry is the next evolution in Longhorn’s toolset. Like Longhorns 1 and 2, it’s a backdoor designed to monitor activity and collect information, and it shares similar code and techniques to the other two tools.

While the organization using these tools was “extremely organized and driven by process,” there was overlap in the use of these malware tools.

“We can see on a timeline that none of these tools were exclusively used at any point in time,” says Thakur. This is a sign that multiple people were using the same code against a handful of organizations around the world at the same time, he says.

The tools were mostly used in countries “that we would consider of national interest,” he continues, though he can’t speak to specific countries or businesses. There was one instance in which a Corentry file infected a machine in the US, but it was quickly uninstalled, indicating it may have been launched by mistake.

Related Content:

Kelly Sheridan is Associate Editor at Dark Reading. She started her career in business tech journalism at Insurance Technology and most recently reported for InformationWeek, where she covered Microsoft and business IT. Sheridan earned her BA at Villanova University. View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/a-closer-look-at-cia-linked-malware-as-search-for-rogue-insider-begins/d/d-id/1328710?_mc=RSS_DR_EDT

Macron Targeted by Russian Cyber Spies

France’s leading presidential candidate Emmanuel Macron’s campaign reportedly is being targeted by hackers ties to Russia’s military intelligence arm GRU.

Leading French presidential candidate Emmanuel Macron’s campaign reportedly was hit with cyberattacks from Pawn Storm, an alleged group of cyber spies with ties to Pawn Storm, the Russian military intelligence agency GRU, according to a Reuters report.

Trend Micro found that phishing attacks and attempts to plant malware on Macron’s campaign site had similar digital characteristics to a cyberattack on German Chancellor Angela Merkel’s group in the spring last year, as well as against the US Democratic National Committee’s presidential campaign for Hillary Clinton, the report noted.

Macron, a vocal critic of Russia’s foreign policy, is set to go against Marine Le Pen, a far-right candidate who is supportive of Russia’s policies and has previously received loans from Russian banks, according to the report. The second round in the French election process is set for May 7.

Trend Micro researchers noted that four bogus email accounts were created using servers that claimed to have a onedrive-en-marche.fr location and other similar locations, which allowed the attackers to engage in “credentialed phishing,” the report noted. The phishing attacks spanned from March through April.

Read more about the cyberattacks against Macron’s campaign here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/macron-targeted-by-russian-cyber-spies/d/d-id/1328711?_mc=RSS_DR_EDT

Macron Targeted by Russian Cyber Spies

France’s leading presidential candidate Emmanuel Macron’s campaign reportedly is being targeted by hackers ties to Russia’s military intelligence arm GRU.

Leading French presidential candidate Emmanuel Macron’s campaign reportedly was hit with cyberattacks from Pawn Storm, an alleged group of cyber spies with ties to Pawn Storm, the Russian military intelligence agency GRU, according to a Reuters report.

Trend Micro found that phishing attacks and attempts to plant malware on Macron’s campaign site had similar digital characteristics to a cyberattack on German Chancellor Angela Merkel’s group in the spring last year, as well as against the US Democratic National Committee’s presidential campaign for Hillary Clinton, the report noted.

Macron, a vocal critic of Russia’s foreign policy, is set to go against Marine Le Pen, a far-right candidate who is supportive of Russia’s policies and has previously received loans from Russian banks, according to the report. The second round in the French election process is set for May 7.

Trend Micro researchers noted that four bogus email accounts were created using servers that claimed to have a onedrive-en-marche.fr location and other similar locations, which allowed the attackers to engage in “credentialed phishing,” the report noted. The phishing attacks spanned from March through April.

Read more about the cyberattacks against Macron’s campaign here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/macron-targeted-by-russian-cyber-spies/d/d-id/1328711?_mc=RSS_DR_EDT

Macron Targeted by Russian Cyber Spies

France’s leading presidential candidate Emmanuel Macron’s campaign reportedly is being targeted by hackers ties to Russia’s military intelligence arm GRU.

Leading French presidential candidate Emmanuel Macron’s campaign reportedly was hit with cyberattacks from Pawn Storm, an alleged group of cyber spies with ties to Pawn Storm, the Russian military intelligence agency GRU, according to a Reuters report.

Trend Micro found that phishing attacks and attempts to plant malware on Macron’s campaign site had similar digital characteristics to a cyberattack on German Chancellor Angela Merkel’s group in the spring last year, as well as against the US Democratic National Committee’s presidential campaign for Hillary Clinton, the report noted.

Macron, a vocal critic of Russia’s foreign policy, is set to go against Marine Le Pen, a far-right candidate who is supportive of Russia’s policies and has previously received loans from Russian banks, according to the report. The second round in the French election process is set for May 7.

Trend Micro researchers noted that four bogus email accounts were created using servers that claimed to have a onedrive-en-marche.fr location and other similar locations, which allowed the attackers to engage in “credentialed phishing,” the report noted. The phishing attacks spanned from March through April.

Read more about the cyberattacks against Macron’s campaign here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/macron-targeted-by-russian-cyber-spies/d/d-id/1328711?_mc=RSS_DR_EDT

Macron Targeted by Russian Cyber Spies

France’s leading presidential candidate Emmanuel Macron’s campaign reportedly is being targeted by hackers ties to Russia’s military intelligence arm GRU.

Leading French presidential candidate Emmanuel Macron’s campaign reportedly was hit with cyberattacks from Pawn Storm, an alleged group of cyber spies with ties to Pawn Storm, the Russian military intelligence agency GRU, according to a Reuters report.

Trend Micro found that phishing attacks and attempts to plant malware on Macron’s campaign site had similar digital characteristics to a cyberattack on German Chancellor Angela Merkel’s group in the spring last year, as well as against the US Democratic National Committee’s presidential campaign for Hillary Clinton, the report noted.

Macron, a vocal critic of Russia’s foreign policy, is set to go against Marine Le Pen, a far-right candidate who is supportive of Russia’s policies and has previously received loans from Russian banks, according to the report. The second round in the French election process is set for May 7.

Trend Micro researchers noted that four bogus email accounts were created using servers that claimed to have a onedrive-en-marche.fr location and other similar locations, which allowed the attackers to engage in “credentialed phishing,” the report noted. The phishing attacks spanned from March through April.

Read more about the cyberattacks against Macron’s campaign here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/macron-targeted-by-russian-cyber-spies/d/d-id/1328711?_mc=RSS_DR_EDT

Macron Targeted by Russian Cyber Spies

France’s leading presidential candidate Emmanuel Macron’s campaign reportedly is being targeted by hackers ties to Russia’s military intelligence arm GRU.

Leading French presidential candidate Emmanuel Macron’s campaign reportedly was hit with cyberattacks from Pawn Storm, an alleged group of cyber spies with ties to Pawn Storm, the Russian military intelligence agency GRU, according to a Reuters report.

Trend Micro found that phishing attacks and attempts to plant malware on Macron’s campaign site had similar digital characteristics to a cyberattack on German Chancellor Angela Merkel’s group in the spring last year, as well as against the US Democratic National Committee’s presidential campaign for Hillary Clinton, the report noted.

Macron, a vocal critic of Russia’s foreign policy, is set to go against Marine Le Pen, a far-right candidate who is supportive of Russia’s policies and has previously received loans from Russian banks, according to the report. The second round in the French election process is set for May 7.

Trend Micro researchers noted that four bogus email accounts were created using servers that claimed to have a onedrive-en-marche.fr location and other similar locations, which allowed the attackers to engage in “credentialed phishing,” the report noted. The phishing attacks spanned from March through April.

Read more about the cyberattacks against Macron’s campaign here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/macron-targeted-by-russian-cyber-spies/d/d-id/1328711?_mc=RSS_DR_EDT

What happens when a vendor doesn’t patch its software?

Microsoft engineers won’t be happy this month, thanks to the community-minded actions of a Github user named Zeffy. Not content with the way that Redmond was updating its software, he decided to patch Microsoft’s patch.

Zeffy is irritated with Microsoft’s decision to stop updating Windows 7 and 8.1 on newer CPUs. The company, which worked hard to push users to upgrade to Windows 10, announced in January last year that it would not update versions of these older operating systems running on seventh-generation processors (that’s Kaby Lake silicon from Intel, and Bristol Ridge silicon from AMD). A select set of products using sixth-generation Skylake processors would continue to get support until the middle of this year, it said.

On April’s patch Tuesday, the policy finally took effect. Microsoft’s update messages told users of older operating systems using seventh-gen chips that their combinations of Windows version and CPU were not supported. Windows 7 and 8.1 users running Intel seventh-generation Core processors, along with AMD “Bristol Ridge/Ryzen/Zen,” and Qualcomm 8996 chips are being locked out of updates, according to Bleeping Computer.

“A giant middle finger”

In the Readme.md file on his Github repo, Zeffy calls this “a giant middle finger to anyone who dare not ‘upgrade’ to the steaming pile of garbage known as Windows 10”.

He took matters into his own hands, expanding the Microsoft update file so that he could see all the update files it contained. Then, he excluded all the binaries that were related to Windows Update, leaving him with 14 files. He compared those with the ones already on his system, and found one file containing two functions: IsDeviceServiceable and IsCPUSupported. He patched the file to bypass those functions, preventing Windows Update from checking to see whether it liked the host CPU or not.

This isn’t the first time that one person has patched another’s software. Naked Security has already written about Operation Rosehub, a volunteer effort by 50 engineers patching open source projects that used a flawed version of the Apache Common Collections library. Many projects used this code, including WebLogic, WebSphere, JBoss, and Jenkins. No one came to patch many open-source projects relying on the Apache library, so Google stepped up.

Another example of guerrilla patching is 0patch, a project from Slovenian consulting firm Acros Security. This approach uses what the firm calls “micro-patching“, in which the binary isn’t modified at all. Instead, the patches are in-memory changes, typically shorter than a tweet, that block malware trying to exploit a particular vulnerability.

The idea is to quickly patch binaries against specific exploits before the vendor can. In many cases, it can be easier to install a targeted in-memory patch than to try and test a bundle of different patches that will affect binaries directly, explained Acros co-founder Mitja Kolsek.

Working around inadequate patching policies

These different approaches to guerrilla patching highlight existing problems with software updates.

0patch has appeal because it’s an easier way for enterprise admins to protect their software without relying on binary patches that may break the systems. The project has now issued more than 300 patches for various products, many of which were not zero-days.

Like 0patch, Operation Rosehub has appeal because in some cases, vendors simply don’t patch vulnerabilities quickly enough. In Google’s case, the problem lay with open-source projects for which no single person has responsibility. This highlights one of the key problems with open source: many eyes may eventually start a problem, but no one may step up to fix it.

Zeffy’s case highlights something different altogether: selective patching, designed to support a vendor’s own agenda at the expense of its users. Microsoft’s decision to stop updating Windows 7 and 8.1 on current-generation processors furthers its own agenda, which has always been to force as many Windows users to upgrade to Windows 10 as possible.

Microsoft explains this by arguing that developers would have to work too hard to support “Windows 7’s expectations” when running on newer silicon. Nevertheless, it in effect holds users of older versions to ransom, which is what irked Zeffy so much.

This is unfortunate, because fighting the security battle is already hard enough. We should be able to rely on software vendors to support their products on all platforms until their official end of life. Microsoft has vowed to offer extended support for Windows 7 – which includes security updates at no extra charge – until January 2020. Windows 8 gets extended support until January 2023.

If patches themselves become a battleground, and users who don’t want to upgrade their OS must begin hunting around for tools that let them patch vendors’s own patches, then system protection – already a complicated and uncertain process – becomes even more daunting for that vast majority of users that simply wants to feel safe when using their operating system. Zeffy’s irascible fix might not be the last.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/thST_UxpEuQ/