Archive for RB

Malware in Text

A team of security researchers has engineered a way of hiding malware in sentences that read like English language spam. The research led by Dr. Josh Mason of Johns Hopkins University along with Dr. Sam Small of Johns Hopkins, Dr. Fabian Monrose of the University of North Carolina, and Greg MacManus of iSIGHT Partners outlined the threat in a paper English Shellcode (PDF) presented at the 2009 ACM Conference on Computer and Communications Security. According to the UK’s Computing, the paper shows hackers could evade anti-virus protection by hiding malicious code in sentences that read like English language spam

alphanumeric shellcodeThe article says that attackers could develop a tool that would be the next step in the hacking and virus arms race. Hackers could hide alphanumeric shellcode in valid files which would activate the malicious payload of a code-injection attack. This attack vector could give attackers control of system resources, applications, and data on a compromised computer.

The researchers report they can generate English shellcode in less than one hour on standard PC hardware. The text in bold is the instruction set and the plain text is skipped. “There is a major center of economic activity, such as Star Trek, including The Ed Sullivan Show. The former Soviet Union. International organization participation.”

The good news, Dr. Mason said that the widespread use of this attack vector is limited because the alphanumeric character set is much smaller than the set of characters available in Unicode and UTF-8 encodings. This means that the set of instructions available for composing alphanumeric shellcode is relatively small. “There was really not a lot to suggest it could be done because of the restricted instruction set,” said Dr. Mason. Long strings of mostly capital letters, for example, would be very suspicious.

Computing claims the work is a breakthrough. Current network security techniques work on the assumption that the code used in code-injection attacks, where it is delivered and run on victims’ computers, has a different structure to non-executable plain data, such as English prose. If an attacker challenge’s the assumption that executable code structure is different from non-executable data malware would be almost impossible to detect.

Dr. Nicolas T Courtois, an expert in security and cryptology at University College London, said malware deployed in this way would be “hard, if not impossible, to detect reliably.” The research is a proof of concept, but Dr. Mason doubts any hackers are using the technique to disguise their code. “I’d be astounded if anyone is using this method in the real world owing to the amount of engineering it took to pull off,” he said. “A lot of people didn’t think it could be done.

Professor John Walker, managing director of forensics consultancy Secure-Bastion, argued the research highlights the flaws in the anti-virus community’s approach to security exploits. “There is no doubt in my mind that anti-virus software as we know it today has gone well past its sell-by date,” he said.

Related articles

rb-

Carly Fiorina

If this technology gets out in the wild, most experts believe that the current signature-based anti-malware products will miss the attack and leave us all defenseless. Sounds like something the chip makers should be working on. Is this why Intel bought McAfee?

What do you think?

Can the anti-malware industry adapt to new threats from attachers?

View Results

Loading ... Loading ...

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Labor Day 2011

Labor Day in Detroit

 

Labor Day in Detroit

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Mobile Patent Warfare

Mobile Patent WarfareOne of the hobbies i have taken up is patent troll watching. Thanks to Flowing Data for pointing out work by Mike Bostock which visualizes the data of who is suing who in the mobile patent warfare battles. To see a live version of this data network go to the bl.ocks.org website here.

Moblie patent suits

Apple ComputersThe data on this chart indicates that Apple is at the heart of mobile patent warfare. Apple (AAPL) has been involved in 9 patent lawsuits. Other prodigious mobile patent litigators include Microsoft (MSFT) with 8 lawsuits, Kodak (KODK) with 7 suits, and newly created Google (GOOG)/Motorola union is involved in 5 mobile patent warfare skirmishes.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Verizon Upgrades Michigan Service to 4G – Almost

Verizon Upgrades Michigan Service to 4G - Almost

I was going to let this press release from Verizon Wireless slide without comment until I got to the end and then I had to jump right out of my Bach Seat and crank out this post. Verizon Wireless (VZ) told MiTechNews they are investing $850,000 in Michigan to upgrade 450 antennas on all of its cell sites between the Saginaw Bay north to the Mackinaw Bridge and east of Interstate 75 to Lake Huron. The company reports the new antenna equipment has resulted in incremental network coverage gains of up to one mile, improving overall reliability for customers.

The project will be complete when the company can swap equipment on one last tower in Roscommon where a nest of osprey chicks has called home since March.

MichiganOur customers in eastern northern Michigan are able to use their devices in more places, especially in buildings,” explained David MacBeth, executive director–Network, Michigan/Indiana/Kentucky region, Verizon Wireless. “We’re constantly refining our network to ensure our customers have the best experience every time they pick up their wireless device.

The company’s ongoing network investment in Michigan now totals more than $1.6 billion to increase the coverage and capacity of its network and to add new services.

rb-

Despite what Mr. MacBeth claims, I’ve heard about an organization that moved to VZW from another wireless provider and VZW could not provide the 4G or any G service in the building. When the customer pushed on VZW to provide any G or basic voice service in their building, the sales rep. came back and said, “we won’t help you because we spent all of our money.”

Verizon Wireless logoApparently, that was the wrong answer, the organization reportedly moved 20 smartphones accounts from VZW back to the previous provider. But hey it is a good press release at least because VZW cares about baby birdies.

What do you think?

Are you satisfied with Verizon Wireless 4G service indoors?

View Results

Loading ... Loading ...

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.