Category Archives: Security

Android Security Patch Delayed: SD Card Exposed

Metasploit gave Google a bit of a roast yesterday.

They accuse the software giant of failing to protect users by delaying a fix for a vulnerability (announced last November) and putting it only into Android 2.3 (the “Gingerbread” release).

A fix for what, you may ask:

Perhaps the easiest win though, is that you can grab anything off of the SD card. You might ask, “Anything?! What about the user separation?” Well, because the SD card has been formatted with the “vfat” (aka “fat32”) file system, there is no concept of ownership. All files are owned by the same user id since the file system itself cannot encapsulate who created which file. As Thomas said, files in the SD card that have predictable names are ripe for the picking. This includes pictures and movies. These may in fact be some of the most private data on your device.

Android 2.3 is currently only on 0.4% of Android phones.

RSA 2011 San Francisco: Cloud Investigations and Forensics

I will be presenting at RSA 2011 in San Francisco:

Session ID: CLD-204

Title: Cloud Investigations and Forensics

Scheduled Session Times: Wednesday, Feb 16, 1:00 PM

Room: Orange Room 305

Abstract: Cloud computing’s growth in popularity has been due to the lure of inexpensive and redundant storage, computation and services. This presentation provides an analysis of what happens when things go wrong, by looking at real-world cloud computing investigations and digital forensics. It proposes a set of technical and legal recommendations to reduce risk.

Session Classification: Advanced

I am Speaking at RSA Conference 2011 - February 14-18 - San Francisco

Addicted to Risk

Naomi Klein, author of “The Shock Doctrine”, asks in her TED presentation “What makes our culture so prone to the reckless high-stakes gamble, and why are women so frequently called upon to clean up the mess?”

One thing that comes to mind when I watched this was how President Bush signed an executive order on July 14, 2008, just before the end of his term, to lift the moratorium on offshore drilling in the eastern Gulf of Mexico and off the Atlantic and Pacific coasts. The moratorium was put in place in 1990 by his father. A year earlier President Bush lifted the moratorium from drilling in Alaska, also put in place by his father.

I thought the risk policy differences, between these two men, would have been at least mentioned.

Stuxnet Analysis (0-day edition)

This is becoming a point of curiosity for me. A 0-day attack is one that no one is ready for because they have not seen it before. No countermeasures are prepared, no detection is known. This begs the question, what do you really know about your environment?

I know it’s uber sexy to talk 0-day, but is that really what makes Stuxnet dangerous? It looks like a symptom to me, but not the problem.

First, the Windows Print Spooler exploit was from 2009. Stuxnet spread using this known flaw that had not been patched. That makes it three 0-day at best, not the reported four. Microsoft claimed it only heard about it in late 2010 and fixed it 13 days later. I’ll spare you the rant, but guess who really argues the case to call things a 0-day?

See “Print Your Shell” in the September 2009 edition of hakin9 magazine.

Second, not all the Stuxnet vulnerabilities were 0-day. It made use of more than just four infamous vulnerabilities; the RPC vulnerability, for example, was from 2008.

Third, even on a perfect day we expect malware detection to get less than 80%. What does a 0-day really represent (assuming you still believe the three are truly 0-day)? We have messed around with the 0-day attacks for ages (depending on your definition, of course), and yet the known vulnerabilities (non-0-day) also have a very high probability of working. A 0-day may not be as serious as other vulnerabilities. I believe they play a secondary, or even a supporting role.

What I mean is the Stuxnet authors knew an awful lot about their target environment. We can talk all day about the probability of a 0-day relative to known vulnerabilities, but what really defines this Stuxnet attack vector as dangerous is knowledge specific to operations. The danger is that the attack is able to get insider knowledge…trusted access and detailed information. The ability of an attacker to conceal themselves after the breach thus is also a symptom, rather than a primary characteristic of the threat.

A good defensive posture will focus on this as a development of insider-based risk, which requires security information at least as good as an attacker’s, as I tried to explain in my presentation at RSA 2010 in London. Know your environment.

Here is a classic targeted attack example from this past weekend in Australia

The University of Sydney (USyd)…website was last defaced Friday night with a message claiming that Jie Gao, the university’s UNIX systems administrator, is incapable of securing the web server.

That message obviously is not meant to say it is theoretically impossible to secure a web server — the inevitability of 0-day flaws. It is to accuse an administrator of not knowing their environment. Major differences from Stuxnet can be found in this attackers means, motive and opportunity, but probably not methods.

It might seem like a tangent, but the TED presentations by Hans Rosling make an insightful and powerful observation on this topic. He went to fix the equivalent of 0-day health risks in Africa using modern medicine, but realized that the greatest threat was not an unknown virus or from lack of sophisticated technology. Once he began to study the environment he found that the prevention of common malnutrition is more effective to improve child survival rates.

What risks are you running in your environment?