in-browser malware

Chat about just about anything else
Forum rules
Do not post support questions here. Before you post read the forum rules. Topics in this forum are automatically closed 30 days after creation.
Locked
mike acker
Level 7
Level 7
Posts: 1517
Joined: Wed Jul 31, 2013 6:29 pm
Location: Kalamazoo, MI

in-browser malware

Post by mike acker »

Zeus, Spy-Eye, and now Tilon are apparently "in browser attacks"
suggested reading

according to the article:
As Silon (and Zeus, and SpyeEye) before it, Tilon performs Man-in-the-Browser attacks by injecting itself into the browser and thus gaining control over the traffic going to and from it, as well as the capacity to capture all form submissions from the browser to the web server. The researchers thought that the same cyber gang was behind the creation of both Silon and Tilon.
this technique has always troubled me as it would seem when an app program loads executable code into its own address space that code could become vulnerable. as I understand it the memory protection model in 80386 and above provides various protections,-- read only pages, pages for executable code, -- ...?

read only pages are fine but how many programmers write re-entrant code? I think msft has attempted to defeat this problem with their ASLR and other whac-a-mole patches but it leaves me wondering -- how to protect the executable code in an address space which is taking in raw data

UPDATE

an interesting article on Wired this morning discusses exploits in application code -- particularly browsers . it is interesting to reflect that in Linux -- if you simply close the browser and re-start it -- you should have a clean copy as the Linux Kernel should prevent any exploit of the user-land browser code from corrupting the library binary code from which the browser is launched.

UPDATE

this article on MSFT EMET reveals the massive effort being made to protect "user land" executable code in msft systems from exploitation. the real concern would be: can the attacker obtain "privilege escalation" -- i.e. get out of his sand-box -- once he has code execution? he would need privilege escalation to attack the host o/s and I don't see that as a real threat in the Linux environment

UPDATE

EMET updated and hardened ( whac-a-mole game continued, as usual )

one might wonder why such measures seem to be needed. as a programmer I control the path that the program follows as well as what data moves from where to where. -- until I make a mistake. Evidently hackers find ways where they can take advantage of mistakes and somehow manage to get executable code into the application memory and secondly manage this in such a way that the path of execution goes into the bad code. this "return oriented programming" seems to be a recent means of doing that; "buffer overflow" having been used extensively as well. but these are programmer errors. but,--- programmer errors are expected in app. programs. the thing that is not acceptable is for such errors to corrupt the host o/s. which, I think, is the essential difference between Linux and MSFT.
Last edited by LockBot on Wed Dec 07, 2022 4:01 am, edited 1 time in total.
Reason: Topic automatically closed 30 days after creation. New replies are no longer allowed.
¡Viva la Resistencia!
mike acker
Level 7
Level 7
Posts: 1517
Joined: Wed Jul 31, 2013 6:29 pm
Location: Kalamazoo, MI

Re: in-browser malware

Post by mike acker »

Krebs discussion of end-point corruption

I'm really curious as to how user-land executable code can best be protected against corruption. recently browsers have been changed to run each web-page separately -- which should help. I would hope that in Linux if I just shut down the browser and re-start it -- it should be "clean" -- as the libraries that hold the Linux executable code should be protected by Linux root security.

similarly it seems to be a "best practice" to close the browser -- after using a sensitive page
¡Viva la Resistencia!
benali72
Level 4
Level 4
Posts: 278
Joined: Sat Mar 23, 2013 11:49 am

Re: in-browser malware

Post by benali72 »

So many browser attacks use javascript. Installing browser extensions for Firefox like QuickJS or NoScript allows you to reduce this risk by controlling when you enable/disable javascript.
mike acker
Level 7
Level 7
Posts: 1517
Joined: Wed Jul 31, 2013 6:29 pm
Location: Kalamazoo, MI

Re: in-browser malware

Post by mike acker »

benali72 wrote:So many browser attacks use javascript. Installing browser extensions for Firefox like QuickJS or NoScript allows you to reduce this risk by controlling when you enable/disable javascript.
I'm not sure it is javascript per se but rather objects conveyed via javascript.

as I understand it javascript is by design benign having only the ability to read/write cookies
... i'm always looking to learn more about this though
¡Viva la Resistencia!
Locked

Return to “Open Chat”