Sykipot Trojan Variant Stealing DoD Smartcard Credentials 44
Trailrunner7 writes "A new research report says variants of the Sykipot Trojan have been found that can steal Dept. of Defense smartcard credentials. The research, published in a blog post Thursday, is the latest by Alien Vault to look at Sykipot, a Trojan horse program known to be used in targeted attacks against the defense industry. The new variants, which Alien Vault believes have been circulating since March, 2011, have been used in 'dozens of attacks' and contain features that would allow remote attackers to steal smart card credentials and access sensitive information."
Ouch! (Score:5, Interesting)
Those cards are heavily used. It's not like this would only impact e-mail, the cards are pretty much used for everything.
Comment removed (Score:4, Informative)
Re: (Score:1)
Re: (Score:2)
Re: (Score:3)
Re:Ouch! (Score:4, Informative)
smart cards are not used without passwords. there's still a 'something you know' aspect to go along with something you have. it's just not the traditional login/password.
That's what they want you to think (Score:4, Funny)
There is a trojan within the trojan to guide the black helicopters to your home. In fact I risk the BSOD just posting this.
vulnerability in the Adobe Reader (Score:2, Informative)
Per the Article:
>> The Trojan is delivered to target systems in a corrupted PDF attached to spear-phishing e-mail messages. The PDFs exploited a previously unknown software vulnerability in the Adobe Reader program, the company said.
Re: (Score:2, Insightful)
Per the Article:
>> The Trojan is delivered to target systems in a corrupted PDF attached to spear-phishing e-mail messages. The PDFs exploited a previously unknown software vulnerability in the Adobe Reader program, the company said.
Is it just me, or is a program whose purpose (for the vast majority of users) is just to open a document to print turned into a gigantic bloated mess that was far better 10 years ago?
Adobe Reader - bloatware (Score:2)
It's not just you. I've noticed it as well. Fillable PDFs are of the good, but why do I need 'adobe echosign' when my work already issues digital certificates, a 'convert to PDF' when it's already a PDF, etc..?
Re: (Score:1)
http://hackademix.net/2011/12/07/hulk-want-pdfjs/ [hackademix.net]
?
Re: (Score:2)
Is it just me, or is a program whose purpose (for the vast majority of users) is just to open a document to print turned into a gigantic bloated mess that was far better 10 years ago?
I disagree. It was a bloated POS ten years ago. I had a great dislike for PDF documents not because there was anything inherently wrong with the format but rather because the Adobe reader was so clunky and slow.
I will grant that it has probably gotten worse in ten years.
Authentication 101 (Score:3)
Authentication 101: Something you have and something you know. I've only read the summary, but if these copied credentials ("something you had") can be used to access sensitive resources remotely, then it would seem that "something you know" is something DoD didn't know.
Re:Authentication 101 (Score:5, Informative)
If the Trojan can pull pki credentials it can keylog pins.
Re: (Score:2)
Re: (Score:2)
I concur. The concept they're selling is that if you're logged into your system with your card and use your pin, they can then use those credentials to gain access to sensitive databases only you are supposed to have access to. I would argue that if your system is so porous that folks are hanging out waiting for you to log in to the network, you're already done.
Re: (Score:3)
The exploit isn't pulling PKI credentials; the exploit is only effective if the card is in the card reader, according to one of the articles. At which point it can play back the PIN; *that's* the exploit.
An exploit that can misappropriate identity within your hard-token based authentication system but only so long as the token is plugged into the system isn't much of an exploit since the only reasonable protection offered by hard tokens is...you can't authenticate if the token ain't there. Show me an exploi
Re: (Score:2)
well then i can tell you that the card is always in the reader while the machine is logged in and unlocked. pull the card and the machine immediately locks. perhaps that needs to change?
Or is that mitigated by the fact that when a website or other resource (outlook msg signing) require reauthorization they force a reread of the card and asks for your pin? Policy wise for email that ensures non-repudiation, and for online resources I know it enforces authentication in case someone fails to lock their compu
Re: (Score:1)
You'll find a great many agencies do not require the card to be in the reader at all times while the machine is logged in (this is more of a practical issue than anything else; if people are forced to leave their cards in the readers all the time, they tend to forget about them when running out of the building during a fire alarm). Many agencies basically require the card to be in the reader for initial login, then it can be removed and there's your standard timeout feature after X minutes of inactivity you
Re: (Score:3)
perhaps, but not in the DoD. DoD locks the machine as soon as you remove the card.
Smartcards suck (Score:2)
Does it really matter the smart card was attacked? If the machine is compromised to begin with anything you or your computer does with your credentials is compromised anyway.
According to TFA attacker still can only do anything while card is in compromised computers reader. What has failed?
Well, only sort of... (Score:5, Insightful)
Re: (Score:1)
Re: (Score:2)
DoD has a live distro for telecommuting. They should make its use mandatory for that, and get rid of their Windows desktops. That's as easy as giving the order, just like when we transitioned TO Windows in ancient times.
It's free to download, grab a copy:
http://www.spi.dod.mil/lipose.htm [dod.mil]
USAF distro solves this for remote users. (Score:2)
http://www.spi.dod.mil/lipose.htm [dod.mil]
Your taxes paid for it and it's a free download. Grab a copy and check it out. Saves buckets of money in license fees compared to a PE-ish live CD, and won't run Windows malware.
Smartcard attack only works on Windows (Score:1)
Smartcard access
The rst one is that it creates a new thread with a keylogger routine. The code is very basic, it stores the window name and the keys pressed under a le named MSF5F0.dat on an unencrypted format, example:
Title:Internet Explorer
www.google.es
Title:My Computer
It uses the WIN32 API [alienvault.com]s functions [GetKeyState, GetAsyncKeyState, GetForegroundWindow, GetWindowTextA].