phone

    • chevron_right

      Sophisticated Watering Hole Attack

      Bruce Schneier • news.movim.eu / Schneier • 19 January, 2021 • 1 minute

    Google’s Project Zero has exposed a sophisticated watering-hole attack targeting both Windows and Android:

    Some of the exploits were zero-days, meaning they targeted vulnerabilities that at the time were unknown to Google, Microsoft, and most outside researchers (both companies have since patched the security flaws). The hackers delivered the exploits through watering-hole attacks, which compromise sites frequented by the targets of interest and lace the sites with code that installs malware on visitors’ devices. The boobytrapped sites made use of two exploit servers, one for Windows users and the other for users of Android

    The use of zero-days and complex infrastructure isn’t in itself a sign of sophistication, but it does show above-average skill by a professional team of hackers. Combined with the robustness of the attack code — ­which chained together multiple exploits in an efficient manner — the campaign demonstrates it was carried out by a “highly sophisticated actor.”

    […]

    The modularity of the payloads, the interchangeable exploit chains, and the logging, targeting, and maturity of the operation also set the campaign apart, the researcher said.

    No attribution was made, but the list of countries likely to be behind this isn’t very large. If you were to ask me to guess based on available information, I would guess it was the US — specifically, the NSA. It shows a care and precision that it’s known for. But I have no actual evidence for that guess.

    All the vulnerabilities were fixed by last April.

    • chevron_right

      Injecting a Backdoor into SolarWinds Orion

      Bruce Schneier • news.movim.eu / Schneier • 18 January, 2021 • 1 minute

    Crowdstrike is reporting on a sophisticated piece of malware that was able to inject malware into the SolarWinds build process:

    Key Points

    • SUNSPOT is StellarParticle’s malware used to insert the SUNBURST backdoor into software builds of the SolarWinds Orion IT management product.
    • SUNSPOT monitors running processes for those involved in compilation of the Orion product and replaces one of the source files to include the SUNBURST backdoor code.
    • Several safeguards were added to SUNSPOT to avoid the Orion builds from failing, potentially alerting developers to the adversary’s presence.

    Analysis of a SolarWinds software build server provided insights into how the process was hijacked by StellarParticle in order to insert SUNBURST into the update packages. The design of SUNSPOT suggests StellarParticle developers invested a lot of effort to ensure the code was properly inserted and remained undetected, and prioritized operational security to avoid revealing their presence in the build environment to SolarWinds developers.

    This, of course, reminds many of us of Ken Thompson’s thought experiment from his 1984 Turing Award lecture, “ Reflections on Trusting Trust .” In that talk, he suggested that a malicious C compiler might add a backdoor into programs it compiles.

    The moral is obvious. You can’t trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code. In demonstrating the possibility of this kind of attack, I picked on the C compiler. I could have picked on any program-handling program such as an assembler, a loader, or even hardware microcode. As the level of program gets lower, these bugs will be harder and harder to detect. A well-installed microcode bug will be almost impossible to detect.

    That’s all still true today.

    • chevron_right

      Click Here to Kill Everybody Sale

      Bruce Schneier • news.movim.eu / Schneier • 18 January, 2021 • 1 minute

    For a limited time, I am selling signed copies of Click Here to Kill Everybody in hardcover for just $6, plus shipping.

    Note that I have had occasional problems with international shipping. The book just disappears somewhere in the process. At this price, international orders are at the buyer’s risk. Also, the USPS keeps reminding us that shipping — both US and international — may be delayed during the pandemic.

    I have 500 copies of the book available. When they’re gone, the sale is over and the price will revert to normal.

    Order here .

    EDITED TO ADD: I was able to get another 500 from the publisher, since the first 500 sold out so quickly.

    Please be patient on delivery. There are already 550 orders, and that’s a lot of work to sign and mail. I’m going to be doing them a few at a time over the next several weeks. So all of you people reading this paragraph before ordering, understand that there are a lot of people ahead of you in line.

    EDITED TO ADD (1/16): I am sold out. If I can get more copies, I’ll hold another sale after I sign and mail the 1,000 copies that you all purchased.