Breaking News

Dozens of VISA HTTPS-protected sites vulnerable to Forbidden attack

 

Dozens of HTTPS-protected websites belonging to Visa are vulnerable to Forbidden Attack, nearly 70,000 servers are at risk.

A new attack technique dubbed ‘Forbidden attack’ expose dozens of HTTPS Visa sites vulnerable to cyber attacks and roughly another 70,000 servers are at risk. A group of international researchers (Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, and Philipp Jovanovic) has discovered that threat actors can inject malicious code and forged content into the browsers of visitors.

The group has published a paper titled Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS.

The experts have discovered 184 servers vulnerable to the attack, some belonging to German stock exchange Deutsche Börse and Polish banking association Zwizek Banków Polskich.

The attack exploit is not new, it is an exploit known at least since ten years, but evidently it has been forgotten. The flaw exploited in the Forbidden Attack is well-documented, but the researchers demonstrated how to exploit it to defeat encrypted communications.

Some organizations have already solved the issue, including the Deutsche Börsebut both Visa and Zwizek Banków Polskich are still vulnerable.

The flaw results from the implementations of the TLS protocol that reuse the same cryptographic nonce for data encryption. The nonce reuse opens the doors to a forbidden attack, which allows hackers to generate the key material used to authenticate site content.

The use of the same nonce when the browser first connects to an HTTPS-protected site makes it possible for threat actors to inject forged content into a transmission over a channel that is shared with the attacker (i.e. An unsecured Wi-Fi network, an attacker on the same LAN segment).

At this point, the tampering of the transmission will not trigger any suspicious behavior that could alert the victims.

“In his comments to NIST Joux [18] described an attack against GCM if nonces are reused. This attack allows an attacker to learn the authentication key and forge messages. Because the uniqueness of nonces is typically a ground rule for cryptanalysis, Joux called his attack the “forbidden attack”. Nevertheless, it highlights an important failure mode in real-world implementations. ” reads the paper published by the researchers. “This results in catastrophic failure of authenticity, even if a nonce is only re-used a single time and enables us to carry out a practical forgery attack against HTTPS,”

Hackers can run a Forbidden attack to tamper communication and add malicious JavaScript code or possibly add Web content could be used for fraudulent activities.

Researcher released online a Proof-of-concept exploit code to show the feasibility of the attack, they also published a video of the attacks against vulnerable Visa sites.

The experts noticed that by giving enough web requests, there’s a high probability a vulnerable website would reuse the nonce,  they estimated that the number of requests necessary for a successful attack still remains extremely high.

The paper reports a table that includes probability p for nonce collision with 2n2 n nonces of 64 bit size, the experts discovered that with about 230 requests the probability is 3% and with 235 requests it is possible to have a 100-percent chance.

The study conducted by the researchers has been split into multiple sub-tasks, initially they scanned the web searching for targets, then they tried to find the vulnerable ones.

“Our evaluation of Internet connected devices has been split into multiple sub-tasks. An initial discovery scan, followed by vulnerability scans on discovered target devices with different parameters over a time span of approximately 18 days. In this section we describe the methods used for discovery and analysis of Internet connected devices during our evaluation. ” continues the paper.

Among the 70,000 sites spotted by the researchers, the experts identified several flawed TLS implementations, including one in the IBM’s Domino Web server and another in load balancers from Radware, both already fixed.

If you appreciate my effort in spreading cyber security awareness, please vote for Security Affairs as best European Security Blog. Vote SecurityAffairs in every section it is reported. I’m one of the finalists and I want to demonstrate that the Security Affairs community a great reality.

https://www.surveymonkey.com/r/secbloggerwards2016

Thank you

Pierluigi

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – Forbidden attack, hacking)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Silent Ransom Group targeting law firms, the FBI warns

FBI warns Silent Ransom Group has targeted U.S. law firms for 2 years using callback…

3 hours ago

Leader of Qakbot cybercrime network indicted in U.S. crackdown

The U.S. indicted Russian Rustam Gallyamov for leading the Qakbot botnet, which infected 700K+ devices…

8 hours ago

Operation RapTor led to the arrest of 270 dark web vendors and buyers

Law enforcement operation codenamed 'Operation RapTor' led to the arrest of 270 dark web vendors…

1 day ago

Chinese threat actors exploited Trimble Cityworks flaw to breach U.S. local government networks

A Chinese threat actor, tracked as UAT-6382, exploited a patched Trimble Cityworks flaw to deploy…

2 days ago

U.S. CISA adds a Samsung MagicINFO 9 Server flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Samsung MagicINFO 9 Server vulnerability to its…

2 days ago

New Signal update stops Windows from capturing user chats

Signal implements new screen security on Windows 11, blocking screenshots by default to protect user…

2 days ago