IE Zero-Day Exploit Disappears On Reboot 103
nk497 writes "Criminals are taking advantage of unpatched holes in Internet Explorer to launch 'diskless' attacks on PCs visiting malicious sites. Security company FireEye uncovered the zero-day flaw on at least one breached U.S. site, describing the exploit as a 'classic drive-by download attack'. But FireEye also noted the malware doesn't write to disk and disappears on reboot — provided it hasn't already taken over your PC — making it trickier to detect, though easier to purge. '[This is] a technique not typically used by advanced persistent threat (APT) actors,' the company said. 'This technique will further complicate network defenders' ability to triage compromised systems, using traditional forensics methods.'"
Re: (Score:2)
The term has been used in the IT security industry for years.
Re: (Score:3, Funny)
Seems kinda silly for Debian to have a command to intentionally go out and get those things...
Re:Advanced Persistant Threat (APT) (Score:5, Funny)
Why? It's a very apt term.
Re: (Score:1)
What the hell....you get a point and I don't? Damn you, Slashbots....damn you all to hell!
Re: (Score:2)
It is even more apt to follow links from TFA to get the real story.
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/hidden_lynx.pdf [symantec.com]
Re: (Score:2)
Just because a bunch of "security" dbags use a term doesn't make a thing.
Re: (Score:2, Offtopic)
It's a polite way of saying "governments" because we used to pretend that out own government wouldn't be doing this to us, so "governments" seemed too broad.
Re: (Score:2)
I didn't say it did, I was just pointing out that it was not just made up.
Re: (Score:1)
Re:Advanced Persistant Threat (APT) (Score:4, Informative)
APT is the new buzzword in IT security, like Web 2.0 for web developers or Cloud for the server guys. APT means bad guys of moderate sophistication all the way to government agencies, so everyone but script kiddies running standard exploit kits.
Re: (Score:3)
Definitely security buzzword bingo:
... diskless attack ... APT ... actor ... network defender ... triage ...
We get it, dude, you find buffer overflows and stuff. You're not a surgeon.
Re: (Score:2)
Re: (Score:2)
It's still the Advanced Passenger Train to me.
Let the train take the strain.
Re: (Score:2)
MOO
Yay! (Score:5, Funny)
Re: (Score:2)
Works for me, but then Windows isn't the default grub entry.
(I kid - XP is actually all right. Which explains why Microsoft are getting rid of it in a few months.)
Re: (Score:2, Insightful)
Re: (Score:1)
Could you explain this scheduling issue more precisely, please. What common insoluble problem justifies the "very much inferior" label?
Re: (Score:1)
Then they took a crap and revisited the Windows 2k days by creating the turd that is Windows 8.
If I wanted my desktop to act like a phone with the phone widgets I'd have used a fucking phone for my desktop, thanks.
Re: (Score:1)
Yeah, Windows 3.51 was better than XP in this respect.
Not being able to write a non-crashing display driver is the real issue, though.
Dual-core became popular in the Vista era (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:3)
Why don't you tell that to my Windows 7 install when some horrible abomination in the background on a page somewhere stalls out not only Firefox but the entire PC.
Oh, and what site, you say? *Facebook.* Hangs with the OS completely unresponsive for an entire minute or more. And this is with NoScript, too.
Re: (Score:2)
So far, I've tried various operating systems for a VM for Web browsing. Believe it or not, XP is the best. If FB stalls or the VM has issues, a quick rollback to a known good snapshot (one that hasn't touched the Net except for updates.) It performs well in 512 MB of RAM for most Web browsing. That way, if FB decides to hang, you are just a few minutes (less if you snapshot the VM while it is on and suspended.)
Re: (Score:2)
Well sure, if you never use bookmarks or care about cached sessions and stuff...
Re: (Score:2)
I copy/paste bookmarks to a different file, so that really isn't an issue. Cached sessions are not a worry either. In fact, being able to dump all state, no matter how much identifying info is left behind is a win for privacy.
Re:Yay! (Score:5, Informative)
Don't forget that now that is harder to do, thanks to the infinite wisdom from microsoft!!
In windows 8 (and 8.1), when you "shutdown" windows, you are really just hibernating the PC, not doing the XP shutdown... When it starts again, it will load the previous state into memory and the malware is still there (and bugs, and crashs, and trash running, etc, etc)
To really "shutdown" a windows, you need to "reboot" it (or press the power button!!)
The real solution is to use linux :)
Re: (Score:1)
Unless you configure your shutdown button to actually shutdown the machine instead of hibernate. (Note: it's been like this since Vista, btw)
Re: (Score:2)
Yanking the cord out of the power supply is a decent substitute for #shutdown -now.
Re: (Score:1)
If you have a cord... pull cord, then pull battery(s).
Re: (Score:2)
If you have a cord... pull cord, then pull battery(s).
My tablet doesn't have removable/replaceable batteries, you insensitive clod!
Re: (Score:2)
Of course it has removable batteries. Take this hammer, and hit this edge sharply. Now that edge. Wedge a knife under there, and pry up. See that? That's your battery!
Re: (Score:2)
Of course it has removable batteries. Take this hammer, and hit this edge sharply. Now that edge. Wedge a knife under there, and pry up. See that? That's your battery!
You're a genius. Want an apple?
Re: (Score:2)
No, thanks.
http://tctechcrunch2011.files.wordpress.com/2007/11/evilapple.jpg [wordpress.com]
Re: (Score:1)
Don't forget that now that is harder to do, thanks to the infinite wisdom from microsoft!!
The article says only XP and 7 are affected, so the changes from 8 to shutdown wouldn't matter.
Re: (Score:3)
The reboot trick is for all software, not just Windows. You haven't been in IT long enough if you've only seen MS OS require this.
I have a bunch of self contained Linux based boxes we have to restart on a regular basis due to memory leak issues in software. I think the OS on it's own is fine, but start adding garbage on top of any OS and you have trouble. Reboots are a common practice for fixing a number of issues for any software you may come across regardless of OS.
I have Windows Servers that get rebooted
Re: (Score:2)
I have a bunch of self contained Linux based boxes we have to restart on a regular basis due to memory leak issues in software.
Memory leaks (unless they are IN the kernel or some very core process like init ) should never require a reboot. Once the process is killed, and the OOM killer should do that at some point, all the memory used/leaked will be freed, by a proper kernel. Which is not to say the application or even the entire system might not be thrashing and nearly at a stand still.
I give it 99% odds you could put a cron job on those Linux boxes to kill and restart the offending process at whatever interval your "regular bas
Re: (Score:2)
No difference. Just a matter of knowing what process to end.
Re: (Score:2)
I blame CamelCase for most Windows security problems. I swear the bumpiness of the function name distracts the mind from thinking properly about argument checking.
Re: (Score:2)
you still have to use the shift key for stupid_case, plus you have to type an extra character.
The One True Way of settling style holy wars is "go with the shorter option", and by that measure CamelCase wins.
Meh, I just want functions to start with capital letters, and variables not to, but some languages don't even get that right! (Technically, it's constants that start with a capital, and function/member names are just constant pointers so capitalize em.)
Re: (Score:2)
My grand ideological vision involves everything being tokenised, so anybody can see any code in any way they like, and use whatever naming style they want.
The canonical representation looks something like LISP, of course ;).
Re: (Score:3)
I've actually seen a team that worked that way, no magic needed: they just had good auto-formatting tools. Everything was canonicalized on check-in and auto-formatted however you wanted on check-out. Each dev worked with his own favorite style, and just had to tolerate the canonical style for looking at diffs (I just realized that one of the team went on to be a VP I think at Canonical, by a strange coincidence).
Re: (Score:2)
My apologies to McCarty and Stroustrup. Gosling deserves it - I had to code in Java, and you don't heal from that, man! (Of course, now C# has the same problem in reverse, with people using properties instead of members for everything and capitalizing property names - you just can't win!).
Re: (Score:1)
Best naming scheme is Write_processMemory_r1_998 and CreateRemote_thread_rev001_2.
No more ambiguity about which part is static and which not.
Bonus: also no need for some silly source control, just change the rev number (or r for release, unless the minor is > 900, which means it's beta), and bam! all the code at your fingertips, all the time!
Disappears on reboot is a limitation, not feature (Score:5, Informative)
Re: (Score:2)
If all you wanted was the data on the end users disk; e.g. credit card numbers, logins, cookies, email passwords, etc; then this is a desirable feature as it makes it much harder for an individual defending systems to get a copy of the code and exploit.
Additionally, if the worm or virus agent is polymorphic in nature, then this assists in avoiding detection by antivirus scans. Remember, those scans slow down end user machines, many companies only do them once a week. By the time the antivirus company upda
Re: (Score:2)
Re:" Copy of the code and exploit"
You have ex
Re: (Score:3)
This PDF is much more informative than the summary or TFA. I got interested, and followed links, stumbling over this along the way.
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/hidden_lynx.pdf [symantec.com]
Re: (Score:2)
If all you wanted was the data on the end users disk; e.g. credit card numbers, logins, cookies, email passwords, etc; then this is a desirable feature as it makes it much harder for an individual defending systems to get a copy of the code and exploit.
Additionally, if the worm or virus agent is polymorphic in nature, then this assists in avoiding detection by antivirus scans. Remember, those scans slow down end user machines, many companies only do them once a week. By the time the antivirus company updates their heuristics algorithm your code is commited to cybernetic oblivion.
That's my take as well. If you're a thief breaking into a building to get a copy of important files, you don't leave a busted out window and the safe sitting wide open. The best theft is the one no-one realized happened. For example, the break into Bit-9 where they stole a digital signing cert would have been far more useful if it wasn't detected. Or instead of stealing something, you're leaving something behind such as installing a trusted root cert that you control.
Re: (Score:3)
Disappears on reboot is a limitation, not a feature
The most sophisticated malware in modern times, Stuxnet, had a built in self-destruct. How is it that a feature that disappears after a certain number of days a feature, but after a reboot not a feature?
If you get root you could always remove payload, if it disappears on its own then it is likely limitation of specific sandbox bypass method.
Small comfort to those who enter their credit card data and then wake up to $-300 dollars, two weeks to pay day, rent due, and not enough gas or food to last. People need to stop being so puritanical about exploits... "Oh, it disappears after reboot, big deal!" ... If it manages to do damage, it doesn't matt
Re: (Score:2)
Re: (Score:2)
To answer your question - one is controlled entirely by exploit/malware authors and other is not.
Yeeeeah... a difference that's sufficiently important why again? Most computer today don't reboot; they hibernate. It could be days to weeks now before they actually wipe it. Weeks during which, it's hoover-vacing every piece of data you put in your browser. Now, let's be honest -- how much do you really do with your computer if your internet is down?
o____o
Offline work (Score:2)
how much do you really do with your computer if your internet is down?
I usually keep enough reading material or coding projects on my laptop to last a few hours of being offline. This comes in handy on my bus commute, as I don't have to pay hundreds of USD per year for cellular broadband.
Lots of really important sounding jargon... (Score:2)
This is the first time I've ever seen the value being used in an XOR loop referred to as a "key".
Re: (Score:2)
It's because it's being used in the context of a simple XOR-based encryption scheme -- very common in malware, actually.
Re: (Score:2)
In this specific case XOR with the short key appears to be used as a method to avoid heuristic detection. If left in plaintext things like kernel32.WriteProcessMemory will trip exploit detectors even if you have Zero-Day.
Complicated unless... (Score:1)
It's maybe complicated unless forensics are capturing a memory image... which they should be these days.
Rootkit vs. CRIT (Score:5, Interesting)
Two broad approaches exist.
Firstly, the rootkit: 'implant' an agent (monolithic or multipartite) which stays as persistent as possible, maintaining control of the system. The most extreme case I've seen writes new firmware to the NIC, which is loaded by the BIOS or UEFI code; this alters the CPU microcode slightly to change TLB handling and then chains a hypervisor into the boot process which is (thanks to the TLB update) hard to detect, and a major barnacle to get rid of - the payloads dropped by the hypervisor's code injections are nowhere near as ninja but somehow keep coming back. (Now you know one more place to look and the general class of attacks if you didn't notice before.)
Alternatively, the CRIT (Covert Remote Intrusion Tool): a non-persistent agent which runs a stealthy process, and when it's done, unloads itself from RAM. Notably, CRITs are never truly reset-proof: this is a conscious design decision. An ideal CRIT leaves absolutely no forensic trace on disk or RAM of the target machine after it disappears (although traces of the vector of infection might need to be cleaned up, and there's always the possibility of server logs from something else - if anyone even knows to look at it). The real world, of course, is rarely so elegant, as anyone who remembers how TSRs weren't always quite so trouble-free.
It is a difference in intent, signalled via design. One prioritises maintaining control above stealth; the other prioritises maintaining stealth above control.
It is telling that the NSA and GCHQ attacks found in the wild so far or described in leaked documents have all been rootkits and never CRITs. Of course, that may be because CRITs simply weren't written of, weren't leaked yet, or were more unlikely to be discovered, but it seems more likely that this is a wide, strategic decision: maintaining control of an asset as long as is possible, even if its cover is blown.
It is very hard to conceive of effective countermeasures - it is, as I unfortunately predicted a little over 15 years ago when I first publicly described such a possibility, likely to become (and now remain) an arms race, between state actors (who, it seems, always wear the black hats), and between non-state actors (black-hats and white-hats alike). In truth, all such agents are terribly dangerous, particularly those with autonomous spreading capabilities, or merely capricious greedy idiots at the keyboard. Perhaps they should be regulated via treaty, like the biological weapons their action resembles: that is an act for politicians and those who lie with a smile on their face. Perhaps we, as engineers, should concentrate on fixing the bugs the vectors exploit; but alas, I fear that may be like trying to sail a giant colander across the Pacific armed only with tape.
I have grave concerns about the direction this whole mess is headed. They have taken what may be the greatest achievement of humankind, and threaten it more than any terrorist ever could, because terrorists don't have a billion dollar budget and a whole world's trust to undermine. We can but try, and do what we can, to fix such damage, and route around it, wherever we find it and whomever perpetrates it for whatever reason - it is all, simply, a bug, at its heart, and bugs need fixing. Perhaps we can build protocols, and software, far more resilient at their core; but until they are ready, please at least let me have my cat pictures and my tea and my discourse and my computer games, lest I become mad as hell and cannot take it anymore. I grow weary. And quietly bitter.
Re: (Score:2)
Re: (Score:2)
You are right, and it's a colander instead of a nearly seaworthy boat that just needs some holes patched because of 'nimble' development practices and several decades of constantly reinventing the wheel and selling it over and over again with a little more gee-whiz each time.
If you want a secure computer you need a conservative stack, free from the ground up, with security designed in from day one, and an emphasis on mathematically correct code rather than features. Otherwise, you are trying to bail a colan
Re: (Score:1)
The only safe solution is to eliminate Microsoft Windows
Re: (Score:2)
> Firstly, the rootkit: 'implant' an agent (monolithic or multipartite) which stays as persistent as possible, maintaining control of the system. The most extreme case I've seen writes new firmware to the NIC, which is loaded by the BIOS or UEFI code
That is _nasty_. May I safely assume that virtual machines, with their hosting server based software NIC's, are immune from this vector? And do you have a reference to this mode of attack?
Dissapears on reboot... (Score:1)
Sure it dissapears!
Unless you're running IE as admin, you have UAC disabled and the malware has installed a hypervisor and you're hickjacked forever without having any chance to detect it. How long before we see that?
Re: (Score:2)
How many people run IE as admin these days? You'd have to be on XP, right?
Re: (Score:2)
How many Windows users do _not_ typically run as an "Administrator", to ease software management? And especially for Active Directory or Exchange administrators, re-authenticating every time they need to escalate to manage their resources during the day becomes burdensome. Most of the Windows admins I know do this as a matter of course, to ease the strain on their typing hands and improve their response time to requests.
Re: (Score:2)
It disappears BY DESIGN. The hackers want it to disappear.
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/hidden_lynx.pdf [symantec.com]
Re: (Score:1)
"us"
AC is a veteran? Core Wars excepted.
Re: (Score:2)
Why do *we* need to keep the *world* free?
Re: (Score:2)
LOL, no.