Security Advisor

Blue Pill Researcher Crosses Into Fuzzy Territory

Also: UK bank's security works for only one browser; trusting trust certs.

At a recent Hack-in-the-Box Conference, Joanna Rutkowska, who developed the malware example called "Blue Pill," attempted to defend her malware and also stated she was developing a new version which would "be even better."

This is a perfect example of a researcher crossing the line between legitimate research and criminal benefit. Rutkowska's first attempt at creating "100 percent undetectable malware" could, arguably, be an attempt to show how new technology has been implemented poorly or insecurely. She believes that the virtualization capabilities of newer processors leaves operating systems open to being completely subverted. If the operating system doesn't prevent what is, or isn't, placed into virtual memory, then code of the type she's developed could take complete control of the OS, preventing anything the user might trust from being trustworthy.

This first attempt was explained away by virtualization experts, who stated it could be detected. Rebuffed, Rutkowska has said she's going to prevent it from being detectable in the ways offered by experts. What she hasn't acknowledged, however, is how difficult it would be to completely subvert the OS. While she may be able to achieve this level of subversion, the question is whether the criminal malware community would ever bother to do so.

Of course, if Rutkowska gets rebuffed again, or has a lapse in ethics, her code may become the code criminals use. Why build it anew if it's already available? And all of this is simply because, according to her, Microsoft has refused to prevent the kernel in Vista from going into virtual memory. Now, while it may or may not be a risk for that to happen, the fact that Microsoft has so far "ignored" her advice would appear to be her primary motivation for whatever work she's doing.

The reality is more likely that when anyone talks about Windows Vista, AMD, Intel and malware in the same breath, they get all sorts of media and speaking requests.

In our opinion, this is actually malware in search of a criminal to use it. She has created the problem, is refining and showing her proof of concept exploit code and is apparently not getting enough attention for all her work. This can only get worse.

Major UK Bank Web Sites with Serious Security Flaws
Numerous major banking institutions fail to take their own advice for their online customers. According to Heise Security, the company's tests of many banking institutions showed that those institutions were using frames for their sensitive processing, such as where you enter your login information. Frames are not, by default, disabled in any version of IE (prior to IE7) and so are susceptible to easy-to-implement spoofing attacks.

Now, before you say this is just another example of someone "not eating their own dog food," realize that if the banks aren't providing access that is securable by their clients, they are leaving their clients susceptible to attack. Heise's demonstration shows that the banks it found vulnerable had not considered the risks they're exposing their clients to, and phishers seem to be well aware of it. Furthermore, the issue here is something that's been around and known for almost 10 years, so there's certainly been enough time to address it.

Unfortunately, few Web sites bother to implement more secure and sensible mechanisms that can help to thwart phishing attempts.

Want More Security?

This column was originally published in our weekly Security Watch newsletter. To subscribe, click here.

Adverse Selection in Online 'Trust' Certifications
Ben Edelman, the originating force behind McAfee's SiteAdvisor software, has published a new paper based on a survey he conducted of some 500,000 sites (PDF here). The survey looked at the trustworthiness of each site (using SiteAdvisor as a judge). He then compared the percentage of sites that were "Truste-certified." His conclusion is that Truste-certified sites are twice as likely as non-certified sites to be considered "bad" by SiteAdvisor.

Edelman concludes that Truste has a systemic problem in how it does business. He believes it does not adequately vet whom it will grant certification to, and allow display of their logo prior to actually fulfilling all of the testing requirements. He also points out that it often continues to report a site as certified, but meanwhile tells him and others privately that they are no longer certified.

His bottom line is that if a certification authority is going to be trustworthy, it must do a better job than Truste is doing in ensuring the sites it has certified are actually trustworthy.

Hacker Gets Away With It
An unfortunate verdict was handed down in a New Zealand court. Gerasimos Macridis had pled guilty to intentionally accessing the New Zealand Reserve Bank's telephone system without authorization. However, a judge dismissed the case after hearing Macridis explain his actions. The judge believed "his intentions were honorable."

Great. So if you're really good at social engineering, then computer fraud is just fine. Macridis discovered vulnerabilities in the bank's telephone systems. He then called the bank, informed it of the issues and sent it an invoice for his unsolicited advice. He did the same thing with Telecom New Zealand.

He then went on to explain that he had previously done work for Telecom New Zealand and police, did not use the vulnerabilities for his own gain and did not divulge the information to any third parties. This, the judge believed, was sufficient to prove his honorable intentions.

Regardless of how honorable his intentions were, if you ask for payment when you supply unsolicited security advice, you can certainly expect a knock on your door. Furthermore, investigating private systems without explicit authorization should always be deemed a crime, as it has been recently in various cases in the United States. We can only hope that the New Zealand case is reviewed, or at least does not contribute to any future defense cases.

About the Author

Russ Cooper is a senior information security analyst with Verizon Business, Inc. He's also founder and editor of NTBugtraq, www.ntbugtraq.com, one of the industry's most influential mailing lists dedicated to Microsoft security. One of the world's most-recognized security experts, he's often quoted by major media outlets on security issues.

comments powered by Disqus
Most   Popular