Trusteer rebuffs bank security bypass claims
Smacks down Times and researchers
Trusteer has downplayed the significance of reports that it might have been possible to bypass its anti-keylogger online banking protection technology.
Digit Security presented research at the 44Con conference last month suggesting that Trusteer's Rapport technology could be ‘switched-off’ and ‘bypassed’ using functionality provided by Rapport itself. It suggested the vulnerability arose as a result of a design flaw rather than a bug.
Trusteer's Rapport transaction security technology is offered as a voluntary download by 50 banks worldwide, including NatWest and HSBC in the UK, ING Direct USA and PayPal. The technology is designed to allow banking transactions to take place without interception even on compromised (malware-infected) machines by interfering with any attempts to log keystrokes or capture screenshots.
Digit Security said the Trusteer Rapport flaw has not been abused by existing malware. The Times followed up on the research with an article (behind paywall here) on the threat.
In a statement issued on Monday, Trusteer chief exec Mickey Boodaei said that it had corrected the flaw discovered by Digit Security. It criticised The Times and Digit Security for failing to give it enough time to design a fix.
An article published in The Times of London Money Section on October 1st 2011, describes a method to bypass Trusteer Rapport's anti-keylogging mechanism and suggests that "millions of customers are at risk of fraud because of a fundamental flaw". We investigated the claim and found it to be a speculative threat that is not currently incorporated in malware. We fixed the issue, but asked The Times for a few days to complete our testing. They decided to run the story anyway.
This situation illustrates why the information security industry has self-instituted a responsible disclosure process. Most researchers follow this practice, and do not disclose a vulnerability publicly until they have advised the software developer of the problem and given them the opportunity to fix it. This is designed to protect users. In this instance, the vulnerability code was made public without sharing it with us first, even though we made multiple requests to see it.
Trusteer downplayed the significance of the flaw discovered by Digit Security, arguing that exploiting it would be difficult in practice. The security company said that even if a hacker were able to use the flaw to disable anti-keylogging functions in Rapport, other secondary security protection technologies would still be in play.
Fortunately, the exploit code published by the researcher (http://www.digit-security.com/files/exploits/rapport-listen.c) doesn't represent a real threat for the following reasons. First, it requires the user to be an administrator, which is not the default mode on Mac computers. Second, this code triggers the operating system to ask for the user's admin password each time the code tries to read keystrokes. Finally, the code cannot be used to read password fields due to restrictions set by the system.
Even if this threat were real, our customers would not be at risk. That's because Trusteer provides a wide range of defences against fraud. It prevents malware from installing on the computer and accessing information inside the browser; it verifies the legitimacy of the website that the customer is currently using to prevent the submission of sensitive information to fraudulent websites; it detects malware activity and removes the files associated with it; and it monitors web pages loaded into the browser and removes malicious content that tries to exploit vulnerabilities in the browser or its add-ons.
Trusteer concludes by criticising Digit Security for failing to follow accepted industry practices on responsible disclosure.
Trusteer accepts feedback from all sources that follow responsible disclosure methods which allow vendors to investigate and, if necessary, provide a fix before a vulnerability is made public. This is an accepted practice in the information security industry and was created specifically to avoid placing users at risk. The researcher who collaborated with The London Times failed to follow this code of conduct. It was irresponsible, and is exactly the type of behaviour we and the industry as a whole are trying to prevent.
More on Digit Security's research can be found here. ®
Sponsored: Today’s most dangerous security threats