Privacy, Security Archive

Rutkowska: “Anti-Virus Software Is Ineffective”

Earlier this year, stealth malware researcher Joanna Rutkowska created a stir at the Black Hat Briefings when she demonstrated a way to infect Windows Vista with a rootkit and introduced Blue Pill, a new concept that uses AMD's SVM/Pacifica virtualization technology to create '100 percent undetectable malware'. In this interview with eWEEK senior editor Ryan Naraine, Rutkowska talks about her interest in computer security, the reality of stealth malware threats, the risks associated with hardware virtualization and why the anti-virus industry comes up short.

Red Hat’s Cox Warns on Open Source Security

Alan Cox, one of the most respected figures in the UK open source community, has warned of complacency over the security of open source projects. Speaking to delegates at London's LinuxWorld conference on Wednesday, he emphasised that considerable sums of money were being spent to try and hack into open source systems. And he cautioned that many open source projects were far from secure. "Things appear in the media like open source software is more secure, more reliable and there are less bugs. Those are very dangerous statements," Cox said. My take: Agree wholeheartedly. Security complacency, often seen in OSNews' comments sections, is very, very dangerous.

‘Less-Than-Zero’ Threat

"The security industry and trade press have directed a lot of attention toward the 'Zero-day attack', promoting it as THE threat to guard against. According to the marketing hype, the Zero-Day attack is the one that you should most fear, so you must put in place measures to defend your organization from it. The Zero-Day threat is born the moment a vulnerability is publicly announced or acknowledged. But what about the period of time that the threat existed before being announced. At StillSecure we call this class 'Less-Than-Zero' threat. In this two-part series I'll examine this Less-Than-Zero threat, compare it to the Zero-Day threat, and discuss ways to protect yourself from Less-Than-Zero attacks and vulnerabilities for which patches, signatures, etc., do not yet exist."

NVIDIA Graphics Driver Blob Root Exploit

A recent security advisory announced today by Rapid7 explains, "the NVIDIA Binary Graphics Driver for Linux is vulnerable to a buffer overflow that allows an attacker to run arbitrary code as root. This bug can be exploited both locally or remotely (via a remote X client or an X client which visits a malicious web page). A working proof-of-concept root exploit is attached to this advisory." The advisory goes on to note that the FreeBSD and Solaris binary drivers are also likely vulnerable and cautions, "it is our opinion that NVIDIA's binary driver remains an unacceptable security risk based on the large numbers of reproducible, unfixed crashes that have been reported in public forums and bug databases."

pfSense 1.0 Released

pfSense is a open source firewall derived from the m0n0wall operating system platform with radically different goals such as using OpenBSD's ported Packet Filter, FreeBSD 6.1 ALTQ (HFSC) for excellent packet queueing and finally an integrated package management system for extending the environment with new features. pfSense version 1.0 was released today.

Exploit Released for Mac OS X Flaw

Computer code that exploits a flaw in Apple's Mac OS X was released over the weekend. The code takes advantage of a weakness in core parts of Mac OS X and could let a user gain additional privileges. Apple provided a fix for the error-handling mechanism of the kernel last week, but the exploit appears to have been authored before then. "It appears to have been written well before the vulnerability was fixed," said Dino Dai Zovi, a researcher with Matasano Security who was credited by Apple with discovering the flaw when the patch was released. Obviously anything but spectacular (since it's fixed), but it does raise the age old question: will the growing popularity of both Linux and OS X lead to more of these exploits-- possibly one that does get released 'in time'?

Sophos Backs MS: No Need for API Access

Symantec has previously complained that Vista's PatchGuard kernel-protection technology might limit Symantec's ability to protect the kernel with its own software. But what do other security vendors think? Yesterday Sophos' Ron O'Brien told BetaNews that "Nothing about the way PatchGuard works would hinder Sophos' architecture for an enterprise security suite. In fact, he argued, if Microsoft wants to use its own methods to close off the kernel, that's a good thing."

Securing NFS – Tunneling NFS Over SSH

"The goal of this howto is building a NFS server that works on an SSH tunnel. This way all traffic between your hosts and the file server is encrypted and thus more secure. Normally you should enter a password every time you try to establish a SSH connection but since we could be mounting at bootup we will use ssh-keygen to create a keypair so we can login without entering a password. We will, however, limit that login session to executing just 1 command."

Symantec: ‘There Is No Safe Browser’

Hackers are hitting paydirt in their search for browser bugs. According to Symantec's twice-yearly Internet Security Threat Report, hackers found 47 bugs in Mozilla's open-source browsers and 38 bugs in Internet Explorer during the first six months of this year. That's up significantly from the 17 Mozilla and 25 IE bugs found in the previous six months. Even Apple's Safari browser saw its bugs double, jumping from six in the last half of 2005 to 12 in the first half of 2006. Opera was the only browser tracked by Symantec that saw the number of vulnerabilities decline, but not by much. Opera bugs dropped from nine to seven during the period.

Jon Ellch Breaks Silence on Apple Wi-Fi Exploit

"Jon Ellch was one of the presenters of the now infamous 'faux disclosure' at Black Hat and DEFCON last month. Ellch and co-presenter Dave Maynor have gone silent since then, fueling speculation that the entire presentation may have been a hoax. Ellch finally broke the silence in an email to the Daily Dave security mailing list over the weekend, and one thing is clear: he is chafing under the cone of silence which has been placed over the two of them."

Analysis of Department of Justice Prosecutions 1999-2006

A landmark study on Department of Justice network crime prosecutions reveals most attacks used stolen IDs and passwords, resulting in far greater damages to affected organizations than previously thought: up to USD 10 million per occurrence and on average more than USD 1.5 million per occurrence. The report, "Network Attacks: Analysis of Department of Justice Prosecutions 1999-2006", concludes that 84% of attacks could have been prevented if, in addition to checking the user ID and password, the organization had verified the identity of the computer connecting to their networks and accounts.

Debunking the Blue Pill Myth

"Blue Pill is the prototype resulting from a security study made by Joanna Rutkowska, which took advantage of new virtualization capabilities of AMD processors (known as SVM and previously as Pacifica) to inject a rootkit in a running Vista operating system. Ms Rutkowska claimed a malware using this method is undetectable. Virtualization.info met Anthony Liguori, Software Engineer at IBM's Linux Technology Center, and, most of all, one of the men behind the Xen hypervisor, to finally debunk the Blue Pill undetectabiliy myth."

The Black Hat Wi-Fi Exploit Coverup

"You've probably heard of full disclosure, the security philosophy that calls for making public all details of vulnerabilities. It has been the subject of debates among researchers, vendors, and security firms. But the story that grabbed most of the headlines at the Black Hat Briefings in Las Vegas last week was based on a different type of disclosure. For lack of a better name, I'll call it faux disclosure. Here's why."