Ransomware trends – all towards more crime

There has always been a question of “what is malware for?”  What’s the point of either planting or automating the planting of malware on a computer that isn’t yours?  Many answers are relevant: For fun, laughs, or by accident To spy or grab data (keylogging, banking trojans) To use the computer’s resources to attack or gain something else (DDoS bots, Bitcoin mining, spam) To damage the person or company whose computer has been penetrated (viruses which delete data, or exfiltrate data to embarrass Sony) However, there’s an emerging and straightforward model for malware: Make money directly from the target via extortion. Ransomware has grown at a high rate over 2014, and all the trends are now moving towards increased prevalence.  The recent growth is the confluence of several trends: The maturity of encryption algorithms The wider availability of anonymizing networks like Tor and I2P The wider availability of anonymous digital currencies like Bitcoin and Litecoin The maturity of a worldwide market in “Zero-Day” exploits for common software packages like Flash or web server software Combine those trends, and it is not just possible, but likely, that criminals will try to extort money from computer users who need their digital files back.  They’ll be able to attack the users (Zero-day exploits and garden-variety phishing), encrypt files (with mature uncrackable algorithms), connect to the user anonymously (via Tor or I2P), and receive payment (anonymously with Bitcoin or Litecoin). With the existing cash flow, criminals have begun to bid for advertisements on websites like huffingtonpost.com, dailymotion.com, and mapquest.com.  Ransomware now has a marketing budget. There’s a lot of money already in this,...

CryptoLocker and Bitcoin

The thoroughly expected “CryptoLocker” malware has attained prominence over the last two months, properly encrypting files and requiring a difficult-to-track ransom in order to receive back the decryption key. At the same time, there has been a large run-up in the price of Bitcoin. Most commentators have focused on the Chinese market for the Bitcoin run-up.  However, finally there is some attention to how the Bitcoin ransoms may be helping to inflate this tiny market: http://ftalphaville.ft.com/2013/11/18/1696832/a-crypto-crisis-or-a-crypto-triumph/ 2) A sinister cryptlocker virus has been spreading aggressively for more than a month. It hijacks computer systems and threatens to delete data unless a bitcoin ransom is handed over. Also, reports abound of a rush of purchases byunsophisticated and distressed buyers who are presumably ready to pay any price, and thus can be squeezed by more sophisticated players in the market. Kaminska makes this reason #2, ahead of the Chinese market and below the Silk Road seizure – but the Silk Road incidents should have lowered the price, not raised it. Combine that with how it might be difficult to buy a MoneyPak, and you’ve got the recipe for a...

Backdoor found in OpenX open source version 2.8.10 – some thoughts

Two days ago, Heise (the German news and IT firm) reported that a backdoor was found in the prominent advertising platform OpenX.  (German link here, and I leave translation to the reader.)  The backdoor itself was injected into a somewhat obscure flowplayer javascript file, with obfuscated php hiding the fact that it was a remote code execution bit of php.  With this code there, it would be trivial for a solid hacker to build a shell for the server and completely compromise it. The question which immediately came up for me was, Huh?  Since when is a webserver interpreting a javascript file as a php file?  I doubted that it is typical for web servers to be configured to have .js files interpreted by the .php interpreter first, then sent to the browser.  However, none of the technology reporting said anything about how the OpenX backdoor was getting the .js file to be executed as .php. A couple examples of the simple explanation that .js files just obviously might house some .php and invoke it: http://arstechnica.com/security/2013/08/backdoor-in-popular-ad-serving-software-opens-websites-to-remote-hijacking/ http://nakedsecurity.sophos.com/2013/08/07/openx-ad-servers-pre-compromised-official-distro-contained-remote-code-backdoor/ But web servers don’t do that.  So there must be something else in the OpenX code which allows javascript to be interpreted as php.  One clue was that the original Heise article said: Die Datei wird durch einen Aufruf von require_once() aktiviert which means, basically, that the rogue PHP function in the flowplayer js would be called and activated by a require_once() call.  But where is that call? The second clue is that there were actually three files involved in the intrusion, not one, and all three are critical to the intrusion.  The somewhat...

Adventures in Live Linux CDs

Recently I’ve needed to use Live CDs for a client, when nothing could be saved on disk.  I’ve used: * Knoppix (best) * Xubuntu (has problems with the wireless card in this laptop) * Tails (security overkill) It is time to take a look at Puppy again, just to see if it is compatible with the wireless card in this server. Incidentally, the idea of routinely using a hard-drive-free Linux live CD is becoming more appealing.  The idea is to have a computer with no connection between current and past sessions.  If you are dealing with information covered by privacy regulations, like student info, health information, or financial information, this can help you meet regulations in short interactions with...

“When Patents Attack!” on This American Life

Intellectual property concerns are paramount in the technology world.  Once the Supreme Court opened the door for patenting computer programs and technical processes, the economic incentive to patent technologies of all kinds became large. Pair that with a potentially less-than-precise Patent Office, which frequently allows patents which are either obvious or have significant overlap with other patents (and frequently both!), then you get a recipe for litigation over the most simple of computer techniques (say, one-click ordering, pop-up windows on mobile, or cloud storage of files). This American Life put together a fantastic exploration of this topic.  Check it out. ...