SUBSCRIBE

Hackers now camouflaging browser attacks

FRAMINGHAM โ€“ Improved network security is forcing hackers to mask virtually every Web browser exploit in a bid to evade detection, says IBMโ€™s Internet Security Systemsโ€™.X-Force research team.

By the end of last year, according to team director Kris Lamb, nearly 100 per cent of all Web exploits were either self-encrypted or relied on obfuscation techniques to make it difficult for standard intrusion detection and intrusion prevention technologies to identify the attack code.

โ€œIn 2006, we saw about 50 per cent of Web exploits obfuscated or encoded,โ€ Lamb said Tuesday, adding that, on average, 80 per cent were camouflaged throughout 2007. โ€œBut that jumped to almost 100 per cent by the end of the year.โ€

The reason for the cover-up boost is straightforward, said Lamb. โ€œTheyโ€™re not dumb. They only do what theyโ€™re forced to do,โ€ he explained. โ€œFor them to continue to get a high rate of return, they had to understand the protection technologies that were being used. And [security] vendors were doing a pretty good job.

โ€œA lot of network security technologies were doing a good job in 2006, when they shifted from e-mail to Web browser as an [exploit] entry point. Vendors have been keeping up with that trend and building new types of [security] technologies to keep up with technologies extending the browser, like Flash and JavaScript,โ€ Lamb continued.

That pressured attackers into hiding more of their browser exploits, and doing a better job of concealing their work โ€” largely by focusing on JavaScript. โ€œMore than any other technology, JavaScript is used to obfuscate and self-encrypt,โ€ Lamb said.

JavaScript is ubiquitous โ€” it is cross-platform and cross-browser โ€” and its inherent complexity lends it perfectly to hacker use, argued Lamb. โ€œAttackers can do very advantageous things, like encode it so when it goes over the wire, all the recipient sees is a data blob,โ€ he noted.

And getting rid of JavaScript is not an option for most users. โ€œEven Iโ€™d be hard-pressed to disable JavaScript entirely,โ€ acknowledged Lamb. โ€œSo much of my experience and my productivity experience depends on JavaScript, or another scripting language, like VBScript or Adobescript.โ€

This year, he predicted, the camouflaging will continue, with hackers increasingly adding secondary scripting languages to their obfuscation and encryption portfolios. โ€œTheyโ€™ll start using other browsing scripting frameworks more โ€” more vendor-tied scripts, like Adobescript,โ€ Lamb said. Also known as JavaScript for Acrobat, Adobescript allows customizing of PDF files using scripting.

Hackers have already put Adobescript to work โ€” very recently, in fact. Monday, McAfee Inc.โ€™s Vinoo Thomas was one of several researchers who noted that attacks are under way that use at least one of the still-unnumbered vulnerabilities in Adobe Reader disclosed last week. Thomas, however, pegged the exploit to Adobe JavaScript.

โ€œThe current vulnerability can be embedded in a PDF file and manipulated through Adobe JavaScript,โ€ he said in a warning posted to the Avert Labsโ€™ blog on Monday.

The masking and encryption, however, is just one facet of the ongoing trend toward attacks aimed first and foremost at browsers, said Lamb. โ€œWhether through drive-by downloads or compromising legitimate sites, or a combination of advanced, targeted phishing, the browser is involved in some way,โ€ he said. โ€œItโ€™s the main frontier of exploit right now.

โ€œWe used to call the operating system the โ€˜keys of the castle,โ€™ but as exploits moved up the application stack and as the browser became the new OS, itโ€™s now the keys to castle,โ€ he added.

Tech Jobs

Categories