STE WILLIAMS

Naughty Flash Player BURIED ALIVE in OS X Mavericks Safari sandbox

Free Regcast : Managing Multi-Vendor Devices with System Centre 2012

The Adobe Flash Player plugin runs in a locked-down sandbox under Safari on OS X 10.9 “Mavericks,” making Apple the latest major web browser vendor to provide additional security when viewing Flash content on the web.

According to a memo posted by Adobe security strategist Peleus Uhley on Thursday, Flash Player in Mavericks is protected by an OS X App Sandbox, a security feature first introduced in OS X 10.7 “Lion” in 2011.


Apple’s relationship with Flash has long been a fraught one. In his landmark “Thoughts on Flash” memo in 2010, Steve Jobs spelled out the reasons why Adobe’s tech wouldn’t be allowed on iOS devices, and security ranked high among his points.

“Symantec recently highlighted Flash for having one of the worst security records in 2009,” Jobs wrote. “We also know first hand that Flash is the number one reason Macs crash. We have been working with Adobe to fix these problems, but they have persisted for several years now.”

With Flash running in an OS X App Sandbox, the plugin is restricted to reading and writing files from only those locations on disk that are necessary for it to function properly. Its access to local device resources and inter-process communications (IPC) channels is also limited, and it has diminished network privileges.

Apple's OS X App Sandbox diagram

Apple’s App Sandbox feature in OS X enforces security controls at the kernel level

Safari is not the first browser to implement such protections. Google took the lead in working with Adobe to develop sandboxing technology for Flash running in its Chrome browser in 2012, and Adobe helped to add similar capabilities to Firefox and Internet Explorer later that same year.

Not that these systems have been invulnerable to attack. Shortly after Adobe implemented its sandbox for Firefox, the security layer was attacked by hackers to escalate access permissions, forcing Adobe, Mozilla, Google, and Microsoft to issue additional patches.

Still, by adding similar sandbox protections to Safari, Apple at last has given OS X users similar protections when viewing Flash content as those already enjoyed by users on other platforms, including Windows and Linux.

The catch? The new sandboxing feature is only available on Safari 7.0, and for that you’ll need to be running Mavericks. Users of OS X 10.8 “Mountain Lion” and earlier are stuck on Safari 6.1, which takes a far more liberal attitude toward the Flash Player plugin. ®

5 ways to prepare your advertising infrastructure for disaster

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/10/24/safari_flash_player_sandbox/

NORKS seeds online games with malware in fiendish DDoS plot

Free Regcast : Managing Multi-Vendor Devices with System Centre 2012

South Korea’s National Police Agency (NPA) is warning users not to download unofficial online games as they may contain malware designed by the North to compromise machines which can then be used to launch DDoS attacks on the country.

The malware in question collects the location data and IP address and sends them to overseas servers, according to local Arirang news site.


The infected machines can then be used to DDoS targets in the south.

It remains unclear exactly why police suspect NORKS this time around, although the hermit nation has done something similar in the past.

Last June the NPA discovered a plot in which a South Korean businessman purchased online gaming software at a knock down price from alleged Pyongyang agents.

These games were subsequently used to infect users whose PCs were then put to work DDoS-ing the web site of Incheon airport.

Tensions on the peninsula have been mounting in recent months, with claims by Seoul that Pyongyang has an army of 3,000 highly trained operatives bent on wreaking cyber destruction on the south.

Just last week, lawmaker Chung Hee-soo told parliament that attacks since 2009 had caused the country financial damage in excess of £500 million.

As if that wasn’t enough to keep information security professionals in the region busy, reports have emerged of a new Android banking Trojan aimed at Korean users.

Dubbed Android/Trojan.Bank.Wroba, the malware disguises itself as the Google Play Store app, stealing log-ins and other information when users access their online banking accounts, according to The Hacker News.

5 ways to prepare your advertising infrastructure for disaster

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/10/25/norks_malware_ddos_south_korea/

WhiteHat Security Releases Web Browser To Fight Off Ads, Tracking

WhiteHat Security has been involved in trying to secure the Web for more than a decade. But earlier this week, the company made a move to come at security from a different angle — through the Web browser itself.

The company pulled the covers off of a beta version of its own Web browser, nicknamed Aviator. Available as a free download, the browser’s focus can be summed up in two words: privacy and security.

“Browser security has been a topic that both [WhiteHat security director of product management] Robert Hansen and I have been discussing publicly for years now,” said WhiteHat CTO Jeremiah Grossman, in an email. “Many people ask us what browser we use, and our answer has always been ‘my own.’ That browser is Aviator. It is a browser that we feel confident in using not only for our own security and privacy, but one that we can now confidently recommend to family and friends when they ask. So, in that sense, it has been an internal, personal project for years.”

In announcing Aviator, Hansen argued that the major browser vendors choose not to make changes that could run the risk of hurting their market shares or ability to make money, particularly when it comes to online ads.

“Pop-up blockers used to work wonders, but advertisers have switched to sourcing in JavaScript and actually putting content on the page,” Hansen said. “They no longer have to physically create a new window because they can take over the entire page. Using Aviator, the user’s browser doesn’t even make the connection to Google’s advertising servers, so obnoxious or potentially dangerous ads simply don’t load. Aviator uses an extension called Disconnect, which doesn’t block every ad in the world, but it does block enough that it’s a significant improvement in both speed and safety.”

The browser has been designed by default to run in a “private mode” that purges any cookies being stored when the browser is restarted. The browser has also made plug-ins such as Adobe Flash Player and Java click-to-play to limit their use in the name of tracking and malware attacks.

“A large percentage of malware is distributed through Java or Flash exploits via drive-by attacks,” Hansen explained. “Often sites are compromised and malicious content is sourced in or is sometimes distributed through ad networks. By allowing the content to be load-only when the user wants, as opposed to at the whim of whoever has developed the Web page, it reduces the likelihood of exploitation by a huge amount through those commonly used plug-ins.”

The browser is built off of Chromium. Right now, Aviator works only on Macs, but support for Windows and other operating systems may come in the future.

“Because WhiteHat is primarily a Mac shop, this initial version is Mac OS X,” Grossman explains. “The feedback so far has been very positive, and requests for a Windows, Linux, and even open-source versions are pouring in, so we are definitely determining where to focus our resources on what should come next. But there is no definite time frame yet of when other versions will be available.”

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/privacy/whitehat-security-releases-web-browser-t/240163114

IBM Study: Security Officers Gaining a Strategic Voice, Transforming Technology And Business In Global Organizations

ARMONK, N.Y., Oct. 24, 2013 /PRNewswire/ — A new IBM (NYSE: IBM) study of security leaders reveals that they are increasingly being called upon to address board-level security concerns and as a result are becoming a more strategic voice within their organizations.

(Logo: http://photos.prnewswire.com/prnh/20090416/IBMLOGO)

The findings reveal that a constantly evolving threat landscape, emerging technologies and budgetary restraints are requiring security leaders to play a more active role in communicating with C-suite leaders and with their boards, as the rise in security incidents impacts brand reputation and customer trust.

Additionally, cloud and mobile adoption continues to grow as a focus area for the majority of security leaders.

The 2013 IBM Chief Information Security Officer Assessment takes the pulse of security leaders from Fortune 100 and mid-sized businesses. Among the findings:

Technology Trends — Moving beyond the Foundational: Mobile security is the number one “most recently deployed” initiative, with one-quarter of those surveyed deploying it in the past 12 months. According to the findings, while security leaders are looking to advance mobile security beyond technology and more about policy and strategy, less than 40% of organizations have deployed specific response policies for personally owned devices or an enterprise strategy for bring-your-own-device (BYOD).

Nearly 76% of security leaders interviewed have deployed some type of cloud security services — the most popular being data monitoring and audit, along with federated identity and access management (both at 39%). While cloud and mobile continue to receive a lot of attention within many organizations, foundational technologies that security leaders are focusing on include identity and access management (51%), network intrusion prevention and vulnerability scanning (39%) and database security (32%).

Business practices — Catching the Vision: The security leaders interviewed stress the need for strong business vision, strategy and policies, comprehensive risk management, and effective business relations to be impactful in their roles. Understanding the concerns of the C-suite is also critical as more seasoned security leaders meet regularly with their board and C-suite leaders.

The top trends that they discuss include identifying and assessing risks (59 percent), resolving budget issues and requests (49 percent) and new technology deployments (44 percent).

When asked what advice they would give to a new security leaders, respondents recommended a strong emphasis on vision, strategy and policies, comprehensive risk management and effective business relations.

“Building the trust of the C-suite and the board is critical to the success of a security officer,” said Ken Kilby, Chief Information Security Officer, BBT Corporation, one of the largest financial services holding companies in the United States. “Beyond internal relationships, developing relationships with law enforcement, industry partners and legislators is crucial in fostering greater public and private communication and will ultimately help to reduce the total attack surface and protect an organization’s data.”

Measurement — Providing the Right Feedback: Security leaders continue to use metrics mainly to guide budgeting and to make the case for new technology investments. In some cases, they use measurements to help develop strategic priorities for their security organizations. In general, however, technical and business metrics are still focused on operational issues. For example, over 90% of respondents track the number of security incidents, lost or stolen records, data or devices, and audit and compliance status — fundamental dimensions security leaders would be expected to track. Far fewer respondents are feeding business and security measures into their enterprise risk process even though security leaders say the impact of security on overall enterprise risk is their most important success factor.

“It’s evident in this study that security leaders need to focus on finding the delicate balance between developing a strong, holistic security and risk management strategy, while implementing more advanced and strategic capabilities such as robust mobile security that includes policies for BYOD,” said David Jarvis, co-author of the report and manager at the IBM Center for Applied Insights.

About the Assessment

The IBM Center for Applied Insights, in collaboration with IBM Security Systems and IBM Security Services, conducted in-depth interviews with senior leaders who have responsibility for information security in their organizations. The goal of the interviews was to identify specific organizational practices and behaviors that could strengthen the role and influence of other security leaders. To maintain continuity, interviewees were recruited from the pool of 2012 research participants — 80% of those recruited were prior participants — with an emphasis on more mature security leaders. Interviewees were from a broad range of industries and four countries. Access the full study, www.ibm.com/security

About IBM Security

IBM provides the expertise, skills, services and technology to help you reduce the cost and complexity of securing IT infrastructures for IBM clients. IBM solutions include planning and design through implementation, testing, monitoring and management of multi-vendor environments.

For more information on IBM, visit www.ibm.com/security or to join the conversation and follow @IBMSecurity on Twitter. Visit our Security Intelligence Blog at www.securityintelligence.com

Article source: http://www.darkreading.com/management/ibm-study-security-officers-gaining-a-st/240163118

Santa Clara Ranks #1 In The U.S. For Online Fraud Origination

San Jose, Calif. – October 23, 2013 – ThreatMetrixtrade, the fastest-growing provider of integrated cybercrime solutions, today announces data ranking the top U.S. cities for the origination of online fraud. The data reveals that Santa Clara, CA, is the nation’s top spot for online fraudsters, followed by San Jose, CA, Chesterfield, MO, New York and Atlanta rounding out the top five.

Leveraging a sample of transactions across more than 1,900 customers, 9,000 websites and 500 million monthly transactions from the ThreatMetrixtrade Global Trust Intelligence Network (The Network), ThreatMetrix reviewed activity from Q3 2013 (July 1-Oct. 1), scoring each transaction with a fraud risk of low, medium or high. High risk transactions often require additional fraud screening or are rejected by businesses. The top 100 U.S. cities were then ranked based on their percent of high and medium risk transactions.

The data shows that the Bay Area in particular is the epicenter for online fraud, with three cities ranked in the top 10 list for origination of online fraud – Santa Clara (1), San Jose (2) and Fremont (6).

“With so many technology companies and extensive technology intelligence in the Bay Area, it’s no surprise to see a high rate of online fraud in the area,” said Peter Liske, vice president of product management at ThreatMetrix. “As cybercriminals become more sophisticated and identify new ways to compromise businesses and consumers, cities with high technology know-how and connectivity rates are more likely than ever to be attractive targets for cybercriminals. To protect against online fraud, any business operating online needs to take preventative measures and have a strategic fraud screening process in place.”

The top 10 list of U.S. cities for online fraud origination, according to ThreatMetrix:

Santa Clara, CA

San Jose, CA

Chesterfield, MO

New York

Atlanta

Fremont, CA

Tempe, AZ

Dallas

Rochester, NY

Miami

Cybercrime has evolved into a severe risk for businesses across industries – including e-commerce, banking, social media, insurance, government, enterprise and others. According to recent data from The Network, ThreatMetrix found that account takeover attempts and payment fraud nearly doubled in a six-month period. Major cities with a high level of transactions are particularly vulnerable to these risks, as cybercriminals take advantage of the opportunity to steal credit card numbers, identities and passwords for personal profit.

Following the launch of The Network earlier this year, ThreatMetrix now offers the only global data repository that provides insight into positive and negative behavior and threat intelligence for both online personas and devices using trust-based authentication. The Network differentiate between good and bad actors in real-time so suspicious transactions can be blocked or require additional screening without inconveniencing authentic customers.

“Through The Network, our customers are now protected against account takeover, payment fraud and identity spoofing attempts with the most comprehensive repository of data on the market,” said Liske. “As fraudsters continuously find new ways to automate their attacks, ThreatMetrix continues its commitment to the fight against cybercrime by providing an accurate, instantaneous risk assessment of all transactions.”

To view fraud attempts as they happen in real-time, check out the ThreatMetrixtrade Web Fraud Map here: http://www.threatmetrix.com/threatmetrix-labs/web-fraud-map/.

About ThreatMetrix

ThreatMetrix secures Web transactions against account takeover, payment fraud, identity spoofing, malware, and data breaches. The ThreatMetrix Global Trust Intelligence Network, which analyzes 500 million monthly transactions, provides context-based authentication and Web fraud prevention to help companies accelerate revenue, reduce costs and eliminate friction. ThreatMetrix protects more than 1,900 customers and 9,000 websites across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government, and insurance. For more information, visit www.threatmetrix.com or call 1-408-200-5755.

Article source: http://www.darkreading.com/vulnerability/santa-clara-ranks-1-in-the-us-for-online/240163119

Black Hat West Coast Trainings Early Registration Deadline Today

SAN FRANCISCO, Oct. 24, 2013 /PRNewswire/ — Today, Black Hat, the world’s leading family of information security events, announced the final day for Black Hat West Coast Trainings early registration pricing. Attendees who register by midnight, October 24, will save $200 on some of the most sought-after trainings Black Hat has to offer. This four-day event will bring together the security community’s brightest researchers to unleash hands-on Training courses previously only available during Black Hat’s core international events. The event, covering the very latest InfoSec research and intelligence, will take place take place December 9 – 12, 2013, at the Washington State Convention Center in downtown Seattle, WA. For more information and to register, please visit http://www.blackhat.com/wc-13/.

(Logo: http://photos.prnewswire.com/prnh/20131024/SF03409LOGO)

“There is incredibly high demand in the industry for this level of technical expertise and training,” explained Trey Ford, General Manger, Black Hat.

“Offering the community another opportunity to take advantage of these popular courses in a tech hub like Seattle was a no brainer. Our goal is to continue cultivating the discussions and trainings that help define tomorrow’s information security landscape.”

Some highlights of the upcoming West Coast Trainings include:

— Pentesting with Kali Linux: Offensive Security, the team behind Kali,

has re-written this course from the ground up to reflect the most modern

and effective techniques that all penetration testers need to know.

Pentest bash scripting? Reverse tunneling and exfiltration? Exploiting

Windows apps? It’s all here and more.

— Adaptive Penetration Testing: This challenging, fast-paced course will

teach attendees how to best use available tools and methodologies to

accurately emulate modern threats, all while adapting to tightening

budgets, limited timeframes and diverse skillsets.

— Adaptive Red Team Tactics: To combat the constantly evolving attacker,

participants will develop stealth, evasion and persistence techniques to

effectively emulate the enemy and demonstrate the impact of a successful

attack.

— Assessing and Exploiting Control Systems with SamuraiSTFU: Going far

beyond your traditional SCADA security course, attendees will experience

hands-on penetration testing techniques used to test embedded electronic

field devices, network protocols, RF communications and controlling

servers of ICS and Smart Grid systems.

As with all popular Black Hat courses, the West Coast Trainings will fill up quickly, since they were selected based upon the high demand for their content.

Be sure to reserve a spot in the Training course(s) of your choice while they are still available. You can find the full list of Trainings here. Please visit the registration page for additional information.

Future Black Hat Dates and Events

Black Hat Regional Summit, Sao Paulo, Brazil, November 26-27, 2013 Black Hat Trainings, Seattle, Washington, December 9-12, 2013 Black Hat Asia 2014, Singapore, March 25-28, 2014 Black Hat USA 2014, Las Vegas, Nevada, August 2-7, 2014 Black Hat Europe 2014, Amsterdam, The Netherlands, October 14-17, 2014

Connect with Black Hat

Twitter: https://twitter.com/BlackHatEvents – hashtag #BlackHat

Facebook: http://www.facebook.com/blackhat LinkedIn Group: http://www.linkedin.com/groups?home=gid=37658

Flickr: http://www.flickr.com/photos/blackhatevents/

About Black Hat

For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global events and trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors. Black Hat Briefings and Trainings are held annually in the United States, Europe and Asia, and are produced by UBM Tech. More information is available at: http://www.blackhat.com.

Article source: http://www.darkreading.com/black-hat-west-coast-trainings-early-reg/240163110

WatchGuard Technologies Extends Email And Web Gateway Security Features

DUBAI, United Arab Emirates, Oct. 24, 2013 /PRNewswire/ — GiTex Technology Week

2013 — WatchGuard Technologies, a global leader in integrated, multi-function network security platforms, today announced the latest operating system for its email and web-based security appliance, WatchGuard XCS Version 10. With new Microsoft Hyper-V(r) support for XCSv, IPv6 support, and outbound anti-spam capabilities, XCS 10 streamlines the implementation and management of content security strategies for small, medium and large enterprises.

“WatchGuard XCS delivers an effective defense-in-depth platform for email, Web and data loss prevention. The latest upgrade to our operating system is designed to make deployment and management easier for IT security professionals, and deliver new functionality that can help meet today’s challenges around virtualization and IPv6,” said Roger Klorese, director of product management at WatchGuard Technologies.

The WatchGuard XCS appliance is one of the top-rated email security and content management appliances on the market today, according to SC Magazine.1 It delivers the industry’s most effective defense-in-depth for email and Web, including powerful data loss prevention. XCS provides protection from email and web-based threats including spam, viruses, compromised websites, blended threats, and network attacks.

“Email and Web are two of the most commonly virtualized enterprise applications and the ability to protect them within the same cloud or virtualized environment gives our IT organizations increased flexibility and business continuity,” said Jakob Roemer, technical manager at Montes A/S. “We can now leverage the best-of-breed security features in XCS – such as anti-virus, anti-spam, anti-phishing, anti-malware, data loss protection, email encryption and more – and align our content security policies across these virtualized platforms.”

XCS also includes new IPv6 support. With the number of IPv6 devices growing and many areas of the world running out of (Asia), or running low on, IPv4 addresses, the move to IPv6 is underway. According to Gartner, Inc.,2 “As IPv6 adoption grows, security researchers and attackers will focus more on discovering IPv6 vulnerabilities. Strong vulnerability management processes will be critical to a successful IPv4 to IPv6 migration.” XCS allows organizations to apply the same rich security controls to their email when migrating to IPv6 or mixed-addressing environments.

Furthermore, with the proliferation of BYOD and guest network access, IT organizations can no longer count on attacks coming only from outside the business. To help combat this problem, WatchGuard XCS 10 now includes out-bound anti-spam controls to clean outbound email and help preserve corporate reputation.

XCS Version 10 is a free upgrade available to all users of the XCS hardware and XCSv virtual appliances with LiveSecurity subscriptions. For more details, please click here.

About WatchGuard Technologies, Inc.

WatchGuard(r) Technologies, Inc. is a global leader of integrated, multi-function business security solutions that intelligently combine industry standard hardware, Best-of-Breed security features, and policy-based management tools.

WatchGuard provides easy-to-use, but enterprise-powerful protection to hundreds of thousands of businesses worldwide. WatchGuard products are backed by WatchGuard LiveSecurity(r) Service, an innovative support program. WatchGuard is headquartered in Seattle, Wash. with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit WatchGuard.com.

For additional information, promotions and updates, follow WatchGuard on Twitter @WatchGuardTech on Facebook, or on the LinkedIn Company page.

Article source: http://www.darkreading.com/applications/watchguard-technologies-extends-email-an/240163111

To Determine Threat Level, Context Matters

While many security professionals are ready to toss Java–the favored target of attackers’ exploitation efforts–out of the enterprise, business decision makers often fall back on classifying the software as a business necessity.

Yet, neither side generally has a good way to evaluate the threat posed by Java, because they lack data on actual use of Java in the business and how often malware incidents are caused by the software, says Michael Viscuso, CEO of Carbon Black, a business and security intelligence firm. In a presentation in early October at the ISSA International Conference, Viscuso showed attendees how one company evaluated their use of Java–72 workers needed it for online-meeting software–versus its relative threat–a handful of malware infections could be traced back to the exploitation of a Java vulnerability.

“Getting that context helps malware hunters find more malware and, at the same time, helps the decision maker know that, if I am going to disable Java across the enterprise, then I need a replacement to appease those 72 people,” he says. “Now I can answer questions about the security of the business.”

While intelligence on attackers can help companies understand the threat landscape, only when that information is married to a company’s specific internal data does it really enable businesses to take a more active role is defending their networks. And combining different sets of business-specific data to find relationships can be build an even stronger context in which to evaluate threats, says Dmitri Alperovitch, co-founder and chief technology officer with CrowdStrike.

“All these different sources of data can help you make a better decisions about what the threat means to your business,” he says.

What constitutes context? Different security experts have different definitions. Carbon Black’s Viscuso breaks context down into four attributes: Visibility into events on the network, metadata from those events, the frequency the events happen and the ability to track relationships between different events. Much of the time, companies only look at events; perhaps, they combine it with frequency information and metadata; but do they look at the relationship between different events.

“With that approach, you are looking at each event individually, and that means you have to be correct about each event, whether it is something bad or something good,” he says. “With relationships, it becomes much more obvious what is good, what is bad and what is a false positive or negative.”

[Threat intelligence is only useful if it’s tailored to your specific organization. Here are some tips on how to customize. See Creating And Maintaining A Custom Threat Profile.]

Looking at events as snapshots in time hampers companies from finding the threats in their network and evaluating the criticality of those threats, agrees CrowdStrike’s Alperovitch.

“You may see anomalous activity on the inside, such as traffic going to a certain IP address or a program downloaded from the Internet, but it really means nothing without context–what adversary you are dealing with,” he says.

The first stop to developing better context, however, is to know what is going on inside their own network. That visibility component is the foundation of everything that comes after, says Lance James, head of intelligence for security-services firm Vigilant, a Deloitte company.

“Make sure you get to know your network first,” he says. “You should not be getting threat data if you don’t know what is going on in your network.”

Once a good baseline of visibility is established, the relationship between network traffic, user identity and the company’s applications can help the company develop a context in which to evaluate threats, says Will Hayes, chief product officer at LucidWorks, a data-analytics firm.

“If you can quantify the identity, know the session, and you understand the applications, in a broader sense, you can do a whole lot of statistical analysis and find out a lot of interesting things; you would definitely find anomalous behavior,” he says.

By building up personas, representations of the company’s users and their activities, a company can quickly evaluate any new event within that context and quickly determine if the event poses a threat, Hayes says.

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/threat-intelligence/to-determine-threat-level-context-matter/240163120

Wikipedia sockpuppet saga threatens users’ trust of the service

Sock puppet. Image courtesy of Shutterstock.Vice.com’s Martin Robbins summed it up well: Wikipedia, he said, is “the world’s go-to resource for information on everything from the Boer War to fifth-season episodes of Buffy.”

Although some internet cognoscenti cast a skeptical eye at Wikipedia, the service still garners a vast amount of trust.

That trust is based on an assumption that, ideally, Wikipedia’s content is edited, vetted, and can be reasonably relied on to be more than a collection of marketing puff pieces.

PR firms willing to make a buck out of paying clients by gaming Wikipedia’s editing processes are now threatening that trust, to the extent that alarmed watchers are predicting that, in a few years, a significant portion of the service’s content could well be spam.

Earlier in October, the Daily Dot detailed one of the most extensive sockpuppet investigations ever to be undertaken at Wikipedia, if not the largest ever.

As Wikipedia itself defines it, a sockpuppet is a false online identity assumed by a member of an internet community in order to praise, defend or support a person or organization, or to circumvent a suspension or ban from a website.

As the Daily Dot reported, nearly all of the hundreds of sock accounts uncovered by Wikipedia’s investigation shared a few traits:

Most of the pages created were about companies and living persons; the pages were generally positive and promotional in nature; they often cited articles that were written on websites that anybody could contribute to.

One of the accounts associated with what turned out to be a vast sockpuppet network was called Morning277 and had been active since November 2008.

Morning277 proved to be one busy Wikipedia beaver, logging more than 6,000 edits by the time it was investigated.

On a talk page detailing the long-term history of Morning277’s abuse of the service, Wikipedia editors say that Morning277 is associated with a group of hired writers who collaborate without ever using the talk pages to communicate with each other – a red flag for sockpuppetry.

As of September, Wikipedia had confirmed 323 sockpuppet accounts identified by the investigation, which dates to 2008, with another 84 suspected.

Wikipedia’s editors have tracked most of the entries to a US company called Wiki-PR, a firm that specializes in editing Wikipedia on behalf of paying clients.

The firm offers “Wikipedia Writers For Hire” and claims to “build, manage, and translate Wikipedia pages for over 12,000 people and companies.”

Robbins, reporting last week, noted that Wiki-PR’s promise on its Twitter profile at the time baldly stated the matter:

“We write it. We manage it. You never worry about Wikipedia again.“

Wiki-PR is unapologetic about its business model of charging for Wikipedia editing.

CEO and co-founder Jordan French said in an emailed statement that Wikipedia most certainly does allow paid editing, pointing to a policy proposal to limit paid editing on Wikipedia that had, in fact, failed to pass, given that consensus wasn’t reached in a reasonable amount of time.

In a Wikipedia entry on Wiki-PR’s editing of its pages, Wikipedia editors say that the practices of the public relations firm have contradicted the encyclopedia’s practices, including those of conflict-of-interest editing.

WikipediaThe firm claims to have administrator access that enables it to manage its clients’ Wikipedia presence.

Part of the duties of Wikipedia administrators are, of course, sockpuppet investigations.

In fact, as the Daily Dot described, the Wikimedia Foundation, a nonprofit that oversees Wikipedia and its sister sites, entrusts only a small team of vetted admins with the responsibility.

If Wiki-PR’s claims to have administrator access are true, the Daily Dot suggested, it would mean that the firm has planted “sleeper agents” among Wikipedia’s most powerful users – “a revelation that would likely send chills down the spine of any devoted Wikipedian.”

The investigation concluded that Morning277 wasn’t behind a sockpuppet network, per se.

Rather, it was “primarily a case of meatpuppetry” – i.e., when individuals promote their causes by bringing like-minded editors into a dispute.

As far as whether Morning277 is connected to Wiki-PR, French said he couldn’t really comment, given that it’s “unclear whether there is private litigation (or forthcoming private litigation) between the admin who blocked Wikipedia user Morning277 and the actual person” behind the Morning277 account.

Are you confused yet? I’m confused. Wikipedia has madly intricate editing and investigative processes, along with nomenclature to match.

Is Morning277 a sockpuppet? A meatpuppet?

The difference, to my outsider’s perspective, doesn’t amount to much. Either term refers to those with an agenda to push in the pages of Wikipedia, and that seems to be an inarguably anti-Wikipedian situation.

And again, from this outsider’s perspective, it does strike me that Wikipedia’s “bright lines” with regard to paid editing are too fuzzy and permeable for the long-term good of the service.

What do you think? Are businesses justified in hiring firms like Wiki-PR to massage their message? Or should Wikipedia firm up its bright line to resolutely disallow paid editing?

Let us know your take in the comments section below.

Image of sock puppet courtesy of Shutterstock.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/4VHjhKVOayU/

Anatomy of an exploit – inside the CVE-2013-3893 Internet Explorer zero-day

GO TO PART:   ←Prev   1   2   

In Part One of this article, we looked at how the Internet Explorer (IE) exploit known as CVE-2013-3893 got its foot in the door of Windows, if you will pardon the pun.

In Part Two, we are going to follow the exploit as it takes over IE, suppresses Data Execution Prevention (DEP), and reaches a point where it can run pretty much any program code it likes just as if you had downloaded it yourself.

We think this exploit makes a good example for study, because:

  • It can theoretically be used against IE from version 6 to 11.
  • It works despite DEP and ASLR (Address Space Layout Randomisation).
  • It is already widely circulated, so we aren’t giving away secrets.
  • The vulnerability on which it relies is already patched.

If you haven’t yet read Part One, we suggest that you do so now, as it explains where we will be starting this time, and how we got here.

The story so far

Our test system is running IE 9 on Windows 7 32-bit, and at the end of Part One, our attackers had:

  • [1] Used malicious Javascript to fill known memory addresses with chosen binary data.
  • [2] Loaded a known DLL at a fixed memory address, despite ASLR.
  • [3] Crashed IE in such a way as to cause it to jump to a memory location of their choice from [1].

Visually, our attackers are here:

Controllable knowns

As we explained in Part One, the attackers used JavaScript to allocate and free up a series of text strings to provoke a use-after-free bug in IE.

The bug caused Microsoft’s HTML renderer to use untrusted text string data from the malicious JavaScript to tell IE where to jump in memory, leaving the crooks with three “controllable knowns”:

  • Execution is about to jump to the memory address stored in location 0x121212D6, shown in yellow.
  • The addresses shown in grey, from 0x12121212 onwards, are precisely controlled by a text string in the untrusted JavaScript.
  • The DLL hxds.dll, part of Office, is loaded into executable memory at the unrandomised address 0x51BD0000.

Deciding where to go next

The attackers are about to jump to the address specified in 0x121212D6, and they control that value directly from their JavaScript.

If they choose an address inside hxds.dll, they know what code will execute next, because the address space of that DLL isn’t randomised.

In the actual exploit, the address stored at location 0x121212D6 (the yellow bytes below) is 0x51BD28D4, as shown here:

→ Don’t forget that the x86 and x64 Intel CPUs used in Windows computers are little endian. That means that the least significant byte of a multi-byte value is stored at the lowest memory address, and so on. So the 32-bit value 0xC001D00D would actually appear in memory as the bytes 0D D0 01 0C), just as 0x51BD28D4 appears above as D4 28 BD 51.

If we disassemble the code at the address chosen by the criminals, we get this:

MOV  EAX, [ECX] ; Fetch the contents of the 
                ; memory address in ECX,
                ; where ECX is controlled
                ; by the attackers
CALL [EAX+8]    ; Call the location specified 
                ; in the address 8 bytes past that.

This time, the two lines of code above cause the following chain of execution:

The value of ECX above was forced to the value 0x12121202 by the attacker’s malicious JavaScript, and the contents of the memory block at and around the addresses shown above (from 0x1212111E0 to 0x12121310) were set up by the crooks in the same way.

At the moment, the attackers control the instruction pointer (EIP), but can’t yet aim it at their own machine code because of DEP.

The next best thing, then, is to control the stack pointer (ESP), because the stack lets you set up calls to system functions.

Pivoting the stack

The value chosen for the destination of the CALL [EAX+8], shown in green above, is critical to the rest of the exploit, and gives the attackers control of the stack by means of what is called a stack pivot.

The pivot for this exploit can be seen by disassembling at 0x51BE4A41:

XCHG EAX,ESP  ; Put EAX into ESP, and vice versa
RET

A stack pivot is just a fancy name for any machine code instruction sequence that sets ESP to an attacker-controlled value: it could be a MOV, a PUSH followed by POP, or, as here, an XCHG instruction that swaps the values in EAX and ESP.

The attackers can now use a trick called Return Oriented Programming, or ROP, to control the flow of code execution indirectly.

That’s because the stack now consists of the bytes shown in grey here:

Converted from little endian notation and listed as a vertical stack of 32-bit addresses and their contents, we get this:

12121212:  51C3B376  --ESP points here after pivot
12121216:  51C2046E
1212121A:  51BE4A41
1212121E:  51C2046E
12121222:  51BD10B8
12121226:  51C0E455
1212122A:  51C3B376
1212122E:  51BD71F4
12121232:  121212DA
12121236:  12121212
1212123A:  00001000
1212123E:  00000040
12121242:  12120A0C
12121246:  51C3B376
1212124A:  51C3B376
1212124E:  51C3B376
. . . . 

Thanks to the stack pivot, the attackers are about to execute a RET instruction with the stack pointer aimed at the topmost value in the list above.

Since RET, or “return from subroutine”, pops the value off the top of the stack and jumps to it, the attackers will now leap back into a carefully chosen instruction sequence inside hxds.dll.

In fact, you’ll notice that the topmost eight values on the stack are all addresses inside hxds.dll, so if each of the instruction sequences pointed to by those addresses ends with a RET, the attackers will execute a stitched-together series of instructions of their choice.

That’s not as convenient as simply putting the machine code they want right in their exploit data, but it’s the next best thing, and it’s where ROP gets its name.

→ In exploit literature, each instruction-snippet-plus-RET pointed to by a list of ROP addresses is known as a gadget. A string of ROP gadgets makes a ROP chain or program. ROP programs typically end up following a Byzantine execution sequence, leaping hither and thither in a DLL that hasn’t had its location randomised. This apparent complexity is irrelevant to the CPU, of course, which simply goes where it is told, and does what it is instructed.

The ROP gadget chain

Here’s what we get if we disassemble the gadgets at each of the addresses on the stack:

The chart looks rather complex, but the results are surprisingly straightforward:

  • [1] The first step simply returns to the next ROP gadget, like a NOP (no-operation) instruction.
  • [2] The POP EDI in step [2] serves merely to skip over the next gadget address (the already-used stack pivot); the value stored in EDI is irrelevant.
  • [3] This time the POP instruction loads EDI with the data value 0x51BD10B8 off the stack, and that value is important.
  • [4] Now EAX is loaded with the value stored at 0x51BD10B8. The POP EDI is redundant, but couldn’t be avoided by the attackers, who have to work with the gadget sequences available in hxds.dll.
  • [5] The address loaded into EAX is used as a function pointer, and called by the ROP program by PUSHing it on the stack and then jumping to it with a RET instruction.

Notice that when the final RET in step [5] is processed, the top five values on the stack, denoted [P] in the chart above, are as follows:

12121232:  121212DA
12121236:  12121212
1212123A:  00001000
1212123E:  00000040
12121242:  12120A0C

That leaves three vital questions: what is the memory address stored in location 0x51BD10B8, why did the attackers choose it, and what are the [P] values for?

Neutralising DEP

On our test system, the address stored at location 0x51BD10B8 was 0x759F50AB; when disassembled, it turns out to be the entry point of the function VirtualProtect() in the core system library kernel32.dll:

Even though Windows randomises where this function is loaded, in order to make it hard to find (for reasons which are about to become obvious), the attackers can nevertheless locate it.

That’s because the variable location of the randomised entry point is saved at a fixed location in the unrandomised library hxds.dll.

Understanding system calls

Under 32-bit Windows, system calls are made with the stack set up as follows:

[ESP]    - Return address in calling program
[ESP+04] - Parameter 1 passed to system call
[ESP+08] - Parameter 2
[ESP+0A] ...etc.

→ When preparing for a system call, the parameters are PUSHed onto the stack in reverse order. (The stack grows upwards, towards lower memory addresses, in the diagram above.) That makes it easier to support functions with a variable number of arguments, since the first parameter is always 4 bytes down the stack; the second 8, and so on, regardless of how many arguments there are altogether.

Now the [P] values in the bottom-most section of the ROP chart above can be decoded, because they are the four parameters passed into, and the return address from, the function VirtualProtect():

This means our attackers are on the point of changing the memory protection for their exploit data, like this:

The memory area they will re-protect is the 4KB block starting at 0x12121212, which will end up with the protection permissions PAGE_EXECUTE_READWRITE.

The memory address 0x12120A0C is used to save the previous protection setting; the crooks don’t have any use for this information (the exploit doesn’t tidy up after itself), but the VirtualProtect() function won’t work without it.

And the return address, 0x121212DA, is the beginning of the memory block shown in blue below, immediately following the yellow value at 0x121212D6, where the exploit started off:

Launching the shellcode

When our attackers return from VirtualProtect(), they will effectively have regressed the protections in Internet Explorer to be much like they were under IE 6 on Windows XP2 and earlier.

Their own malicious executable code will run without DEP, and without triggering any dialog box or “are you sure” warning that would tip off a well-informed user: they’re ready for arbitrary Remote Code Execution.

So please join us next time in Part Three, the final installment of this series, where we’ll take their shellcode apart and explain the tricks they’ve use to make it harder to understand!

GO TO PART:   ←Prev   1   2   

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/Ky4SPThr5lk/