|
| tester756 wrote:
| Will WebAssembly save us from this kind of CVEs?
|
| assuming it has capabilities to support "modern" web
| wolverine876 wrote:
| How will WebAssembly save us?
| tester756 wrote:
| I'm asking
| lucb1e wrote:
| But why ask? Why not ask why we can't use forests or jquery
| to prevent these attacks? What is the logic here, how do
| you think it might work, even just vaguely if you don't
| have a worked-out solution?
|
| Edit: from another comment in a sibling thread, you
| indicate thinking that WASM has a "security model /
| sandbox". That would have been (part of) the answer to the
| grandparent comment I suppose.
| tester756 wrote:
| My logic was here that WASM was created/designed by
| companies that do maintain browsers - Mozilla Microsoft
| Google Apple and it is marketed as
|
| "WebAssembly describes a memory-safe, sandboxed execution
| environment that may even be implemented inside existing
| JavaScript virtual machines. When embedded in the web,
| WebAssembly will enforce the same-origin and permissions
| security policies of the browser."
|
| Basically I felt like it was designed with security in
| mind and I do wonder whether it'd prevent attacks like
| this
| dchest wrote:
| No, on the contrary, it makes the attack surface larger.
| tester756 wrote:
| How?
| FastEatSlow wrote:
| Web assembly is extra code and complexity in a web browser
| compared to one without, so there are more potential
| vulnerabilities
| tester756 wrote:
| I don't buy it because you can apply same reasoning to
| every new / changed line of code, yet it ain't always
| true
|
| The question is,
|
| is WASM's security model / sandbox "safer" / "easier to
| actually execute" than JS'?
| vbezhenar wrote:
| It does not matter because JS is not going anywhere.
| Whether it's more secure or not, it's still additional
| attack surface.
| tester756 wrote:
| I believe it does
|
| Of course JS ain't gonna go anywhere now, but if popular
| JS frameworks started emitting WebAssembly behind the
| scenes, so devs could still write their JS(and
| C++/C#/etc) code, but it'd use WASM under the hood then
| that'd start process of the deprecation of JS.
|
| Which would mean that after all popular JS frameworks
| managed to migrate and popular sites adopted to this,
| then in ideal world you'd be able to turn off javascript
| and still use those sites/apps via WASM, not by default
| for everyone, but at least users that care would have an
| option to do so while still being able to use the web.
|
| You gotta start somewhere
|
| I'm wrong somewhere? or out of the touch with reality?
| dchest wrote:
| Perhaps, you can start by learning what WASM is:
|
| https://developer.mozilla.org/en-US/docs/WebAssembly
|
| As for vulnerabilities, here are nccgroup's slides about
| WASM explots:
|
| https://i.blackhat.com/us-18/Thu-
| August-9/us-18-Lukasiewicz-...
|
| Here's an example vulnerability in WASM parsing leading
| to RCE:
|
| https://labs.f-secure.com/assets/BlogFiles/apple-safari-
| wasm...
| napmo wrote:
| Google itself is gathering people's personal data and uses
| fingerprinting methods to track them. This is done on billions of
| people, and not even limited to their actual logged in users! It
| would be nice if governments put an end to Google's invasion of
| people's privacy. It is much more important than some failed
| attacks.
| coder-3 wrote:
| Snowden has shown us that governments encourage and benefit
| from this surveillance thus are unlikely to put an end to it
| shdshdshd wrote:
| Couldn't they just hardware mitm the CPU and Ram, not to be
| prisoner of AES. This way they can dump stages as well.
| ajross wrote:
| Sure, but that requires having a fully instrumented host get
| attacked. If all you have is a few reports of compromised
| machines, it's much harder to work backwards to the exploit.
| The attacker will switch things around before phishing again,
| etc...
|
| Honeypots are harder than they look, basically.
| [deleted]
| sydthrowaway wrote:
| I am so fucking done with the internet turning into a trash pile
| of scams and exploits.
| ______-_-______ wrote:
| Countries have been doing terrible things to people since long
| before the internet
| wolverine876 wrote:
| > Countries have been doing terrible things to people since
| long before the internet
|
| What do you conclude? We shouldn't care or do anything? The
| Internet, the medium, seems to greatly increase the volume of
| scams and from everyone, not just countries.
| user_7832 wrote:
| True but before the internet it was limited to the locality.
| The internet feels like a public park that gets trashed by
| folks all across the world and not just by the neighbors.
| (Just to be clear, I sympathize with your point as well)
| [deleted]
| [deleted]
| stefan_ wrote:
| Who is even routing with North Korea? Seeing how the normal
| populace there literally doesn't have access to the internet,
| what on earth is there to be gained?
| sydthrowaway wrote:
| You know who.
| Symbiote wrote:
| Hong Kong and Russia:
|
| https://bgpview.io/asn/131279#peers-v4
|
| http://cooks.org.kp/en/ is hosted on that network.
| buzzert wrote:
| What evidence do they have that suggests these threats are coming
| from North Korea?
| trashcan01 wrote:
| A statement from Google.
| martyvis wrote:
| I'm actually surprised Google would say this is from the DPRK
| government without also saying it had has been verified by US
| federal government authorities. Usually they leave it for
| others to deal with statements at that level.
| huntsman wrote:
| I think you'll find TAG regularly gives assessment on
| attribution at least at the country level. Iran, China,
| Russia, Belarus and North Korea at least have been named in
| the last few years.
|
| (Disclaimer: I am head of TAG)
| fit2rule wrote:
| vmception wrote:
| And even when knowing how a country or particular state-
| backing is identified, there is nothing preventing other
| hackers from adding the same markers to their own software
| agilob wrote:
| NK hackers are kwnon for adding false flags
| bberrry wrote:
| > These groups' activity has been publicly tracked as Operation
| Dream Job and Operation AppleJeus.
|
| Following those links yield these two documents, which both
| have "Attribution" sections. Presumably some of these tell-tale
| signs were identified in the ongoing exploitation.
|
| https://www.clearskysec.com/wp-content/uploads/2020/08/Dream...
|
| https://securelist.com/operation-applejeus/87553/#attributio...
| [deleted]
| lizardactivist wrote:
| Been looking in that article to find how they concluded it's from
| North Korea, but I can't find it. Can anyone point it out for me?
| buzzert wrote:
| _crickets_
| eli wrote:
| https://www.clearskysec.com/wp-content/uploads/2020/08/Dream...
| vmception wrote:
| Operation AppleJeus
|
| Ok thats clever, and a nod to Zeus exploit kit, I love hacker
| group names lol
| blondin wrote:
| it is interesting that most of the CVEs are "use after free".
| instead of being stuck in an endless cycle of detection and
| patching, maybe, it's time we consider better ways...
| [deleted]
| olivierduval wrote:
| huntsman wrote:
| In this case we only obtained a Chrome exploit.
|
| Whether that means they didn't have exploits for other
| platforms as part of this attack or that we just didn't succeed
| in determining them is unknown.
|
| TAG has certainly found and reported exploits in other
| platforms many times so it is not a matter of not caring.
|
| Source: I am lead of TAG at Google
| [deleted]
| Thorrez wrote:
| Because of the various safeguards:
|
| > Only serving the iframe at specific times, presumably when
| they knew an intended target would be visiting the site.
|
| > In some email campaigns the targets received links with
| unique IDs. This was potentially used to enforce a one-time-
| click policy for each link and allow the exploit kit to only be
| served once.
|
| > The exploit kit would AES encrypt each stage, including the
| clients' responses with a session-specific key.
|
| > Additional stages were not served if the previous stage
| failed.
|
| it was hard to collect the exploits. They only managed to
| collect the Chrome one.
|
| Compare this to Pegasus, malware that attacks both iOS and
| Android. So far researchers have only been able to collect iOS
| versions.
|
| I think it's a little funny that you're complaining that a
| Google security group (TAG in this case) is publicly reporting
| vulnerabilities in a Google product, but not others. With
| Project Zero (a different Google security group), people
| usually complain in the opposite way, and say that it's bad for
| Google to publicly report a lot of vulnerabilities in
| competitor products, because it makes competitors look bad and
| is just done for publicity reasons.
|
| Disclosure, I work at Google, but not on anything related to
| this.
| yunohn wrote:
| I think you misunderstood - they're saying the links served
| nothing, presumably because it's a Chrome-specific exploit.
| SheinhardtWigCo wrote:
| "We did not recover" is ambiguous.
| joshuamorton wrote:
| Or potentially there were exploits but they weren't able to
| encounter them due to the various protection measures the
| attackers used.
| yunohn wrote:
| Either way, I find it very hard to believe that they
| haven't coordinated with Apple and Mozilla on this CVE.
| daenz wrote:
| > Careful to protect their exploits, the attackers deployed
| multiple safeguards to make it difficult for security teams to
| recover any of the stages. These safeguards included:
| * Only serving the iframe at specific times, presumably when they
| knew an intended target would be visiting the site. * In
| some email campaigns the targets received links with unique IDs.
| This was potentially used to enforcea one-time-click policy for
| each link and allow the exploit kit to only be served once.
| * The exploit kit would AES encrypt each stage, including the
| clients' responses with a session-specific key. *
| Additional stages were not served if the previous stage failed.
|
| Is this a normal level of sophistication for a CVE?
| mhoad wrote:
| I think it's currently unusual but makes sense as a pretty
| obvious SOP for an attacker with a specific target set who is
| sitting on top of a pretty valuable vulnerability (RCE on a
| fully up to date Chrome in this instance).
|
| They are hard to come buy and building tooling is a long and
| expensive process on top of everything else.
| [deleted]
| RL_Quine wrote:
| We see some of this with just normal spear phishing against
| companies. The "single click" thing is reasonably common, it
| makes things a bit harder to catch as often the clickthrough
| will change to whatever is being spoofed in the first place. A
| homophone ycornbinator.com would serve the malware first time,
| then next time it would send a permanent redirect. Unique IDs
| you'll see in things like spam SMS, both to work around
| automated blacklisting, but also to work out who clicked
| through and who might be a potential mark the next time even if
| they didn't completely fall for the scam.
|
| Most of what we got was recycled RAT malware with various
| packers though, it didn't trend towards being particularly
| interesting because you usually don't need to be to catch
| people, at least that's my impression. Maybe it's bad toupee
| fallacy.
| wolverine876 wrote:
| Thanks for the input. A nit, sorry, but maybe relevant to
| readers learning a little about anti-phishing: homophones
| sound the same ('-phone' refers to sound, like telephone) but
| differ in meaning, such as 'write' and 'right'. I don't know
| the term for ycombinator.com / ycornbinator.com, which is a
| real problem, of course.
| chrismarlow9 wrote:
| It's a homoglyph https://en.m.wikipedia.org/wiki/Homoglyph
|
| Typically used via poorly named idn homograph attacks
| https://en.m.wikipedia.org/wiki/IDN_homograph_attack
| thaumasiotes wrote:
| Technically ycornbinator.com is just a lookalike.
|
| Homographs look exactly the same.
|
| (And of course "homograph" ["same writing" or "same
| picture"] is a better name than "homoglyph" ["same
| carving"].)
| chrismarlow9 wrote:
| That's fair I'm not really one for jargon and whatnot (I
| think it can actually become less useful if the goal is
| just to communicate something to a person), but the first
| line in wiki says:
|
| > a homoglyph is one of two or more graphemes,
| characters, or glyphs with shapes that appear identical
| or very similar.
|
| "Very similar" and "two or more" being the key words.
|
| As for homograph I found homoglyph by reading the wiki
| and it saying homoglyph is more appropriate.
|
| (Insert obligatory "wiki it's not always accurate etc
| etc"). Overall I'd take either one and personally don't
| care. Just trying to match what you're saying with what
| I'm reading and make sense of where the truth is.
| wolverine876 wrote:
| > (Insert obligatory "wiki it's not always accurate etc
| etc"). Overall I'd take either one and personally don't
| care. Just trying to match what you're saying with what
| I'm reading and make sense of where the truth is.
|
| Diving in (even if the parent doesn't care :) ):
|
| The last sentence is the real challenge: Meanings depend
| 100% on writer and reader understandings. If two agree
| that 'homograph' means 'chicken poop', as long as they're
| the only ones communicating then 'chicken poop' it is;
| but if someone else reads it, our language subsystem
| fails.
|
| Some dictionaries influence meaning by being
| _prescriptive_ (e.g., American Heritage, IIRC); others
| report what has been understood by being _descriptive_
| (e.g., Oxford). The problem is, Wikipedia is neither: It
| represents the understandings of a few editors of unknown
| knowledge; it is neither descriptive nor prescriptive and
| we quickly get into chicken poop scenarios.
|
| * _Homograph_ , report Merriam-Webster and Oxford, means
| words with the same spelling but different meanings (or
| origin or pronunciation), e.g., the _bow_ of a ship and a
| _bow_ and arrow.
|
| * _Homoglyph_ doesn 't appear in Oxford, Merriam-Webster,
| American Heritage, or any others (per Wordnik and
| OneLook), except Wiktionary. Wiktionary descriptively
| traces the word back to 1938 (though maybe with a
| different meaning in that case) and says it means a glyph
| with the same or similar appearance but different
| meaning. That still doesn't define a term for the entire
| string "ycornbinator.com", only the "rn", but close
| enough!
| naniwaduni wrote:
| > Some dictionaries influence meaning by being
| prescriptive (e.g., American Heritage, IIRC); others
| report what has been understood by being descriptive
| (e.g., Oxford). The problem is, Wikipedia is neither: It
| represents the understandings of a few editors of unknown
| knowledge; it is neither descriptive nor prescriptive and
| we quickly get into chicken poop scenarios.
|
| To be clear: reporting what has been understood still
| influences meaning. Choice of inclusion moderates spread;
| definitions are inherently lossy and cannot capture the
| whole range of nuance; the compiler's understanding can
| be inaccurate. Lexicography is not a neutral art, no
| matter your choice of biases. And OED no less "represents
| the understandings of a few editors of unknown knowledge"
| than Wikipedia does. With different goals, and to
| different standards, to be sure, but Gell-Mann amnesia
| goes hard until you get into the weeds.
|
| In any case, to understand "homoglyph" to refer only to
| 1:1 character correspondences gratuitously misunderstands
| the nature of writing. Recall that we have a letter
| called "double u".
| kovvy wrote:
| There is also 'homeograph' - "A word similar -- but not
| identical -- in spelling to another." That seems a better
| fit for your needs.
| mot0rola wrote:
| I am receiving increased SMS spam past week. Is connected to
| this exploit? Msgs are all different domains with unique ID
| appended.
| huntsman wrote:
| Probably not. No signs that this is linked to any mass
| activity.
| ipaddr wrote:
| Tax time
| samsonradu wrote:
| Me too, receiving spam job offers with bit.ly links.
| xunn0026 wrote:
| I too saw one of these. Very odd since I was expecting a
| note about a job.
| TedDoesntTalk wrote:
| Don't reply to those SMS. Your geolocation can be derived
| from your reply, even a STOP or UNSUBSCRIBE reply.
| politelemon wrote:
| For targeted ones I think it is. The details that emerged
| around SolarWinds were quite sophisticated in terms of
| execution, timing, hiding, and cleanup.
| adolph wrote:
| Much of it seems like normal ad-tech practice to identify
| individuals and discourage click-farming. Unique keys sent in
| an email campaign? Oh my scaaary stuff.
___________________________________________________________________
(page generated 2022-03-27 23:00 UTC) |