Feeds

Trusteer rebuffs bank security bypass claims

Smacks down Times and researchers

Build a business case: developing custom apps

Trusteer has downplayed the significance of reports that it might have been possible to bypass its anti-keylogger online banking protection technology.

Digit Security presented research at the 44Con conference last month suggesting that Trusteer's Rapport technology could be ‘switched-off’ and ‘bypassed’ using functionality provided by Rapport itself. It suggested the vulnerability arose as a result of a design flaw rather than a bug.

Trusteer's Rapport transaction security technology is offered as a voluntary download by 50 banks worldwide, including NatWest and HSBC in the UK, ING Direct USA and PayPal. The technology is designed to allow banking transactions to take place without interception even on compromised (malware-infected) machines by interfering with any attempts to log keystrokes or capture screenshots.

Digit Security said the Trusteer Rapport flaw has not been abused by existing malware. The Times followed up on the research with an article (behind paywall here) on the threat.

In a statement issued on Monday, Trusteer chief exec Mickey Boodaei said that it had corrected the flaw discovered by Digit Security. It criticised The Times and Digit Security for failing to give it enough time to design a fix.

An article published in The Times of London Money Section on October 1st 2011, describes a method to bypass Trusteer Rapport's anti-keylogging mechanism and suggests that "millions of customers are at risk of fraud because of a fundamental flaw". We investigated the claim and found it to be a speculative threat that is not currently incorporated in malware. We fixed the issue, but asked The Times for a few days to complete our testing. They decided to run the story anyway.

This situation illustrates why the information security industry has self-instituted a responsible disclosure process. Most researchers follow this practice, and do not disclose a vulnerability publicly until they have advised the software developer of the problem and given them the opportunity to fix it. This is designed to protect users. In this instance, the vulnerability code was made public without sharing it with us first, even though we made multiple requests to see it.

Trusteer downplayed the significance of the flaw discovered by Digit Security, arguing that exploiting it would be difficult in practice. The security company said that even if a hacker were able to use the flaw to disable anti-keylogging functions in Rapport, other secondary security protection technologies would still be in play.

Fortunately, the exploit code published by the researcher (http://www.digit-security.com/files/exploits/rapport-listen.c) doesn't represent a real threat for the following reasons. First, it requires the user to be an administrator, which is not the default mode on Mac computers. Second, this code triggers the operating system to ask for the user's admin password each time the code tries to read keystrokes. Finally, the code cannot be used to read password fields due to restrictions set by the system.

Even if this threat were real, our customers would not be at risk. That's because Trusteer provides a wide range of defences against fraud. It prevents malware from installing on the computer and accessing information inside the browser; it verifies the legitimacy of the website that the customer is currently using to prevent the submission of sensitive information to fraudulent websites; it detects malware activity and removes the files associated with it; and it monitors web pages loaded into the browser and removes malicious content that tries to exploit vulnerabilities in the browser or its add-ons.

Trusteer concludes by criticising Digit Security for failing to follow accepted industry practices on responsible disclosure.

Trusteer accepts feedback from all sources that follow responsible disclosure methods which allow vendors to investigate and, if necessary, provide a fix before a vulnerability is made public. This is an accepted practice in the information security industry and was created specifically to avoid placing users at risk. The researcher who collaborated with The London Times failed to follow this code of conduct. It was irresponsible, and is exactly the type of behaviour we and the industry as a whole are trying to prevent.

More on Digit Security's research can be found here. ®

The essential guide to IT transformation

More from The Register

next story
Rupert Murdoch says Google is worse than the NSA
Mr Burns vs. The Chocolate Factory, round three!
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.