Security Watch

Oracle Rootkit: Not a Hacking Tool?

A white hatter is developing a tougher database rootkit for security reasons -- but can it be used for evil?

Hacking
Alexander Kornbrust is developing his second version of an Oracle rootkit which he says will be harder to detect. He claims it's not a hacking tool but instead intended to highlight the weaknesses in such databases. He plans to unveil the new version at Black Hat Las Vegas in July.

This is just what we need so we can look to database security companies to help us figure out how to remove such tools installed by criminals. I thought it was interesting to see Kornbrust suggesting that the criminals are more savvy than the consumer…could it have something to do with the work he's done so far, or is he claiming that all his work so far is based on the work of others?

It's safe to say that any application framework, be it Microsoft SharePoint, IIS or Oracle, that can be abused as an operating system can, and that attackers may seek to exploit them. But creating a cross-platform database rootkit seems more like creating a SYN-flooding tool than helping to solve database security issues.

Red Hat Directory Server and Red Hat Certificate Server High Risk Vulnerability: The Help button functionality within the server's Management Console Admin pages could be exploited to trigger a buffer overflow allowing an attacker to elevate their privileges. However, the attack must first gain access to the Management Console Admin pages.

The U.S. National Security Agency (NSA) has issued guidelines (PDF) for how to remove extraneous data from Microsoft Word and other documents prior to publishing them as Adobe PDFs.

It has long been know that such documents use "filler" data to pad the document, often information from other documents. Further, if changes were tracked during the creation of the document, or comments embedded, these too could end up in the published document unexpectedly. The NSA attempts to ensure this doesn't happen via these guidelines. The agency admits, however, the guidelines are not comprehensive and only cover the majority of risks.

It's noteworthy that the government is coming out with instructions on how not to leave stupid things in your documents. Word 2003 offers several options to help avoid saving a document containing metadata. When publishing such a document, it is always a good idea to first disable hidden tags (such as tracked changes), save the document, open it again, and then copy the contents to an entirely new document. By default, Word 2003 will prompt you before saving a document with track changes enabled.

Malicious Code
According to published reports, 70 individuals in the British Parliament and other British government offices were targeted by e-mail-based attacks using the .WMF exploit (MS06-001) originating from China.

Well, this hardly passes the sniff test. Imagine, if you will, that one person who happens to have had dealings with the U.K. government was compromised by a bot or other malware. Imagine they have the e-mail addresses of, say, 70 people on their computer. Imagine the malware they are infected with attempts mass mailings. Imagine that the bot they are infected with was updated with the .WMF malware.

It's a pretty easy scenario to imagine and far more common than you might expect. Bots are very quickly updated with whatever malicious attacks are available, and they often spread themselves by mass-mailing.

Want More Security?

This column was originally published in our weekly Security Watch newsletter. To subscribe, click here.

Human Factors
The Anti-Phishing Working Group (APWG), not surprisingly, says that phishing attacks have nearly doubled during the one-year period between November 2004 and 2005. Some 93 major trusted brand names were targeted during 2005, up from 64 in 2004. In addition to luring unwitting victims to sites to type in their personal information, many criminals are installing keystroke-logging trojans as well. Such trojans would allow them to capture the keystrokes used to, for example, log into bank sites and other protected Web locations.

The obvious question here is whether or not there has *ever* been a drop in phishing attacks? Given that this relatively new form of cyber-criminal activity is lucrative, and methods of cashing in are becoming better known, why should we expect any drop? Thus far very little is being done to thwart phishing attempts, but some software are trying to identify phishing attempts. The Thunderbird 1.5 e-mail client is one, as well as some browser toolbar add-ins.

There have also been reports about a phishing generation site (quickly taken down) -- essentially a criminal's toolbox to create your own phishing attempts.

About the Author

Russ Cooper is a senior information security analyst with Verizon Business, Inc. He's also founder and editor of NTBugtraq, www.ntbugtraq.com, one of the industry's most influential mailing lists dedicated to Microsoft security. One of the world's most-recognized security experts, he's often quoted by major media outlets on security issues.

comments powered by Disqus
Most   Popular