Feeds

Exploit code targets Mac OS X, iTunes, Java, Winzip...

Time for an Evilgrade

Secure remote control for conventional and virtual desktops

A researcher from Argentina has released an exploit package that can install malware on end user machines that run iTunes, Mac OS X, Winzip and a host of other popular software.

Evilgrade is the brainchild of Francisco Amato and works by exploiting weaknesses in the automatic upgrade feature of an affected program or operating system. It works only when a man-in-the-middle attack has first been carried out, but thanks to the domain name system vulnerability that has dominated security coverage ever since researcher Dan Kaminsky sounded the alarm three weeks ago, that's not much of a problem.

The demo here shows just how effective Evilgrade is now that the exploit code for the devastating DNS bug was folded into Metasploit. It shows how the upgrade feature on Sun's ubiquitous Java runtime environment can be targeted to remotely execute arbitrary code on a fully-patched machine.

In addition to iTunes, Mac OS X, Winzip and Java, other programs that Evilgrade can attack include Winamp, Notebook, OpenOffice, Notepad++, Speedbit and the Linkedin Toolbar.

Amato, of Infobyte Computing Security Research, isn't the only researcher who's been thinking about security weaknesses in updating features. Security consultant Derek Callaway of Security Objectives has recently issued advisories warning against serious vulnerabilities in both Lenovo laptops and Cygwin, a tool that creates a Linux-like environment on Windows PCs. Like the exploits carried out by Evilgrade, the attacks Callaway warns of also rely on a man-in-the-middle condition, in which attackers are able to sit in between the victim and a trusted site.

The DNS bug discovered by Kaminsky isn't the only way to create a man-in-the-middle condition. Other attacks involving DNS, ARP and DHCP spoofing can also suffice, and with the recent release of a program called KARMetaSploitt (a combination of Metasploit and KARMA that's included within the latest BackTrack LiveCD), there's yet another menu-driven way to achieve the effect. ®

Remote control for virtualized desktops

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.