1-day exploits,Binary Diffing & patch management.The side threats

Recently ESET security firm has reported the latest version of the Blackhole exploit kit that has been updated to include a new exploit for the Java CVE-2012-0507 vulnerability.  The exploit was discovered for the first time on 7.03.2012 and it first detections were dated on March 12, 2012 and today a public module for Metasploit Framework multi platforms has been released for exploitation of CVE-2012-0507.

I have opened the article with this information to introduce a really interesting topic, the 1-day exploit, exploits based on checking patched versions of software to identify what the vulnerabilities that have been patched actually are. The concept is quite simple, simply analizing the patch management status of a system it possible to know with vulnerability haven’t yet patched. exploiting these vulnerabilities it is possible to attack an unpatched system.

Of course compared to a 0-day vulnerabilities we have reduced possibility of success due the correct patching of a target but this attacks are really insidious and cheaper respect the 0Days. Consider also that for this vulnerabilities is quite simple to retrieve on internet information and tool to make an attacks.

In the most complex case we can imagine a research that through a revers engineering of a released patch develop its own kit to a attack unpatched target.

The majority of this exploits are related today to Java vulnerabilities also due its large diffusion on multiplatform sistems. Jave exploits are in fact an effective way to inslall malicious programs on target machine, consider the recent spam campaign that have infected a huge quantity of machine or the incredible number of infected web sites that allow this kind of attacks. The mechanism is simple, a legitimate web site is infected introducing iFrames that redirect victims to the latest version of Blackhole. The malicious domain name and infected webpage are identical to the legitimate one. Once on the infected website the damage is done!

According Eset same infection method and the same redirection methods have been used several times, famous the case of the popular news resource izvestia.ru where a modified versions of the Win32/TrojanDownloader.Carberp family were loaded onto the victim machines.

Java vulnerabilities and in particular every 1-day exploits is increasing used by cyber crime and state sponsored a hackers.

“This is the most effective way for exploiting end-user systems and is sometimes effective across a variety of platforms,” writes ESET. Consider that the development of a 0-days is really expensive and time-consuming due the intense research that must be conduced to discovery and exploit the vulnerabilities, for this reasons typically this kind of exploit are used by governments.

 

Cybercrime has mass market approach that not necessary needs a so sophisticated attack methodology, that’s why the 1-day exploit approach is taking place.  To give an idea of a typical patching process I have designed the following chart, its duration is highly variable depending on the structure of the organization that implement the procedures and the duration of each stage components.

It’s clear that few organizations are able to patch their systems in a short time. Consider large organizzation with complex architectures, for them the impact of a patch must be analyzed in detail to avoid problems to IT infrastructure, then this case in is necessary to extend the duration of the test phase.

Also the phase of deployment can have variable length, for example in a company located over multiple locations with a high number of systems to patch and strongly heterogeneous. the deployment activities will be more expensive.  It ‘easy to understand that the time between the disclosure of Partch and its application in a production environment is the interval in which systems are vulnerable to 1-Day vulnerabilities.

ESET has demonstrated how quickly the Blackhole gang can react to the 1-day opportunity.

“There’s intense interest in vulnerability research, with legitimate research seized upon by malware authors for malicious purposes,”

David Harley, a senior research fellow and co-author of this research told Infosecurity:

“The increase in volumes of 1-day exploits suggests that even if 0-days research prices itself out of the mass market for exploits, inadequate update/patch take-up among users is leaving plenty of room for exploits of already-patched vulnerabilities (as with the current spate of Tibet attacks).”

Just few minutes after the release of patches, using binary diffing techniques researchers and criminals are able to identify the vulnerabilities that the have been fixed. The term diff derive from the name of the command utility used for a comparison of files, in the same manner are compared binary of a system before and after the patch is applied.

This binary diffing technique are particulary efficient against Microsoft’s binaries because the company releases patchs regularly and inside the patch code quite simple to identify the code that patch the vulnerability usually concentrated in small portion of the binary code.
Today an attackers have access to a huge quantity of tools to identify unknown vulnerabilities just patched, they only need to launch the attacks during the time frame users or corporates are applying patches.

During patch applying time frame, the end users are more vulnerable and targeted using 1-day attack. Most famous frameworks for Binary diffing are DarunGrim2 and Patchdiff2.

In the reality the process of reverse engineering of a patch is more complicated because each vendors use different compilers and optimization methods. Remember the case of the mystery related to the source code of malware Duqu … it was even difficult to understand the programming language used because the developers had adopted a compilation with special options.

The 1-day exploit are real threats that happening every patch days. Sometimes some people diff different version of product, finding in their binaries vulnerabilities fixed silently . So as the attacking technology improves, the protection techniques need to evolve accordingly, we already have several anti diffing tools like “Hondon” but is also necessary that the major vendors will adopt strongest solution for the patching of their products.

In the meantime the only guaranteed defense against the 1-day attack is to patch our system before the criminal exploits.

Pierluigi Paganini

http://www.blackhat.com/presentations/bh-usa-09/OH/BHUSA09-Oh-DiffingBinaries-PAPER.pdf

 

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

2 hours ago

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

2 hours ago

Google fixed critical Chrome vulnerability CVE-2024-4058

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…

7 hours ago

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

19 hours ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

1 day ago

US offers a $10 million reward for information on four Iranian nationals

The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…

1 day ago

This website uses cookies.