Malware disguises in software for undetectable attacks

You should be grateful that the following publication only shows a proof-of-concept of a hack: German researchers have shown that software distribution tools on the Internet can be transformed into players , without modifying the original code.

Malware

Felix Gröbert, Ahmad-Reza Sadeghi and Marcel Winandy of the University of Ruhr were able to develop an on-the-fly mechanism for infusing code into a download. As they write in their work (PDF) hosted on PacketStorm:

"THE he uses us virus infection routines and network redirection attacks, without having to modify the application itself. This allows her of executable files downloaded with an embedded digital signature, since the signature is not automatically verified before the file is executed. "

Χρησιμοποιούν αυτό που αποκαλούν ένα συνδετικό (binder) για να ενώσουν στην αρχική εφαρμογή, τον κώδικα. “Κατά την εκκίνηση της μολυσμένης εφαρμογής το binder ξεκινάει επίσης. Αναλύει το δικό του αρχείο για πρόσθετα ενσωματωμένα εκτελέσιμα αρχεία, τα αναδομεί και τα εκτελεί. Όλα αυτά είναι εντελώς αόρατα στον χρήστη.”

redirect attack

A successful one it is highly dependent on the ability to redirect traffic, as shown above.

Governments, researchers say, could be able to exploit the network hubs between the sender and the receiver to overshadow the traffic. The same can be done with vulnerable routers.

To mitigate such attacks, the researchers say, software distributors need to step up their distribution mechanisms to block traffic hijacks. Technologies like OpenVPN, IPSec or HTTPS would be helpful enough.

Digital signatures do not seem to help this hack and the user or operating system should be able to control the hashes. "Reference values ​​should be obtained through reliable channels."

Anti-virus on the other hand they should be modified to check for the behavior of the binder. "Trusted virtualization" architectures could also help.

The Register

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.086 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).