SlideShare una empresa de Scribd logo
1 de 41
Man-in-the-Browser Attack Vectors Gunter Ollmann – Chief Security Strategist IBM Internet Security Systems gollmann@us.ibm.com  http://blogs.iss.net/ IBM Date/Time:  Tuesday  (November 18, 2008)   4:00pm - 5:00pm Topic:  Web 2.0
[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object]
Threat Evolution
Threat Evolution – The Old Days ,[object Object],[object Object],[object Object],[object Object]
Threat Evolution – Abstraction ,[object Object],[object Object],[object Object],[object Object]
Threat Evolution – Parasitic Era ,[object Object],[object Object],[object Object],[object Object]
Man-in-the- Middle  – old news?
Intercepting Traffic – Man-in-the-middle Customer PC Web Services Man-in-the-middle A host under the attackers control is inserted as a proxy between the victim’s system and their destination ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Limitations of Man-in-the-middle ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Injecting in to the Web browser ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Understanding the Web browser Threat http://www.technicalinfo.net/papers/UnderstandingTheWebBrowserThreat.html
Intercepting Traffic – Man-in-the-browser Trojan Application Local Proxy Agent OS Hooking Keyloggers, Screen grabber TCP/IP Stack Interception Packet inspection, pre/post SSL logging System Reconfiguration DNS Settings, Local HOST file, Routing tables, WPAD and Proxy settings Traditional Malware Operates and intercepts data at points through  which the Web browser  must communicate  Man-in-the-browser Malware hooks inside the Web browser
API Hooking Malware Application The Web browser WinInet httpsendrequest(), navigateto() Winsock TCP/IP stack Clean System Internet Malware Proxying Web browser data . Application The Web browser WinInet httpsendrequest(), navigateto() Winsock TCP/IP stack Internet Infected System Manipulate Copy, redirect, script, change, insert, sell.
Man-in-the-browser Malware  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crime with Man-in-the- Browser
Traditional Banking Malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MITB – Grabbing Login Credentials ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Pre-login First page of login sequence is manipulated Login Multiple fields & pages added to the login sequence Post-login Authenticated user asked additional security questions
MITB – Grabbing Login Credentials Original pre-login fields UID, password & site Modified pre-login fields Now with ATM details and MMN New fields added MITB malware inserted additional fields. Records them, and sends them to the attacker
MITB – Grabbing Login Credentials Modified pre-login fields Now with ATM details and MMN Programmable Interfaces Malware authors developing an  extensible platform that can be  sold or rented to other criminals Configuration files XML support, dynamic updates
Hiding in Plain Sight
MITB – Focusing on the Money Transfer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MITB – State-of-the-art Banking Proxy Trojan Attacker makes off with the money and the victim is unaware a transaction has occurred Victim logs in to the bank “securely” and banks “normally” Proxy Trojan starts functioning once the victim logs in Intercepts each transaction Calculates what is supposed to be in the account Modifies the page that appears to the victim Steals some money
Honing in on the Transaction Customer logs in Authenticates successfully and securely Transfers Customer navigates to the fund transfer interface Validation Customer asked to provide a validation key for the transaction – may include a bank-issued “salt” value 2 nd  Submission Customer clicks “Submit” to proceed Confirmation Transfer complete Transaction Validation As an anti-keylogger and anti-replay technique, some banking applications require the use of a separate “ validation” code for each transaction Payment Details The customer proceeds with entering transfer details (from, to, value, when, etc.) Submission Customer clicks “Submit” to proceed Submit Submit
Honing in on the Transaction – Malware Injection 2 nd  Submission Customer clicks “Submit” to proceed Payment Details Customer enters their transfer payment details Background Malware In the background, the proxy Trojan has created it’s own transfer details Submission Customer clicks “Submit” to proceed Validation Customer asked to provide a validation key for the transaction – maybe including a bank-issued “salt” value Malware Fakes The malware fakes a “validation failure” even though the fake transaction worked. Prompts user to “try again” 2 nd  Validation Customer enters another validation code 3 rd  Submission Malware submits the original “real” customer transfer information Confirmation 2 nd  transation is confirmed back to the customer.  In reality, two transfers have been conducted Submit Submit Submit
Preventing Transaction Injection – Banks Response ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Engineering past CAP Transfers - Original Transaction Validation Assuming the customer has already logged in, they must successfully navigate multiple pages to complete a funds transfer.  Page (1) Which FROM account? Page (2) How much? Where TO? Page (3) Are details correct? Page (4) CAP  instructions and CODE? Page (5) Validation complete!
Social Engineering past CAP Transfers - Injected  Transaction Monitoring The malware continuously monitors the customer as they navigate the pages to conduct a funds transfer HTML Page Insertion An extra page is inserted in to the transfer sequence and requests an additional CAP “ Security Code”.  Page (1) Which FROM account? Page (2) How much? Where TO? Page (3) Are details correct? Page (4) CAP  instructions and CODE? Page (5) Security CODE? Page (6) Validation complete!
Social Engineering past CAP Transfers - Injected ,[object Object],[object Object],To Account:   9812-3451-23 Amount:   $1,500.00 Validation code: 456123 Validation code: 998543 Security Code: 3133731137 Amount: $1,500.00 Validation Code Calculation Customer must type in the “To Account” number and “Amount” in to the code calculator. The calculator also uses PIN, Date and time information to calculate the validation code Page Insertion As part of the process, the attacker inserts a fake page (extra step in “banks” process) in to the Web browser.  The fake page asks the victim to use their calculator again – but to use a “Security Code” which is in fact the attackers bank account – and submits the second transaction.
SMS & Out-of-band Validation/Reporting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
An Entwined Threat
Man-in-the-browser Ramifications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Future Man-in-the-Browser Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROTECTION STRATEGIES
The Elephant in the Room ,[object Object]
Physical Client-side Validation ,[object Object],[object Object],[object Object],[object Object]
Protection Improvement Mindset ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Improving Web application design ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Questions? Gunter Ollmann –  Chief Security Strategist IBM Internet Security Systems gollmann@us.ibm.com  http://blogs.iss.net/ IBM Date/Time:  Tuesday  (November 18, 2008)   4:00pm - 5:00pm Topic:  Web 2.0

Más contenido relacionado

La actualidad más candente

Man In The Browser
Man In The BrowserMan In The Browser
Man In The BrowserSave Manos
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisCSCJournals
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568IJRAT
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDECTM360
 
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESAM Publications,India
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - KloudlearnKloudLearn
 
Isaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdfIsaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdfMarco Morana
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSonionid12
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment SystemsDomenico Catalano
 
Internet banking applications' security
Internet banking applications' securityInternet banking applications' security
Internet banking applications' securitySecuRing
 
Keeping hackers out of your POS!
Keeping hackers out of your POS!Keeping hackers out of your POS!
Keeping hackers out of your POS!AVG Technologies AU
 
Phishing Education
Phishing EducationPhishing Education
Phishing EducationBrandProtect
 

La actualidad más candente (20)

Man In The Browser
Man In The BrowserMan In The Browser
Man In The Browser
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Jon ppoint
Jon ppointJon ppoint
Jon ppoint
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
 
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Isaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdfIsaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdf
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment Systems
 
Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9
 
Internet banking applications' security
Internet banking applications' securityInternet banking applications' security
Internet banking applications' security
 
Keeping hackers out of your POS!
Keeping hackers out of your POS!Keeping hackers out of your POS!
Keeping hackers out of your POS!
 
Phishing Education
Phishing EducationPhishing Education
Phishing Education
 

Similar a CSI2008 Gunter Ollmann Man-in-the-browser

Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh
 
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...PROIDEA
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
Security Compliance Web Application Risk Management
Security Compliance Web Application Risk ManagementSecurity Compliance Web Application Risk Management
Security Compliance Web Application Risk ManagementMarco Morana
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpJoann Davis
 
Combating Constantly Evolving Advanced Threats – Solution Architecture
Combating Constantly Evolving Advanced Threats – Solution ArchitectureCombating Constantly Evolving Advanced Threats – Solution Architecture
Combating Constantly Evolving Advanced Threats – Solution ArchitectureIBM Sverige
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security SolutionMobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solutionguestd1c15
 
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)DCIT, a.s.
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryAmmar WK
 
Ransomware
RansomwareRansomware
RansomwareG Prachi
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserSource Conference
 
Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperMan in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperHai Nguyen
 
Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Asia Pte Ltd
 
Online Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat ModelOnline Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat ModelEoin Keary
 
Improving Network Security with IP &DNS Reputation Services
Improving Network Security with IP &DNS Reputation ServicesImproving Network Security with IP &DNS Reputation Services
Improving Network Security with IP &DNS Reputation Serviceswhitehat 'People'
 
Script based malware detection in online banking
Script based malware detection in online bankingScript based malware detection in online banking
Script based malware detection in online bankingJakub Kałużny
 

Similar a CSI2008 Gunter Ollmann Man-in-the-browser (20)

E banking security
E banking securityE banking security
E banking security
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
 
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
 
Network security
Network securityNetwork security
Network security
 
Security Compliance Web Application Risk Management
Security Compliance Web Application Risk ManagementSecurity Compliance Web Application Risk Management
Security Compliance Web Application Risk Management
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
 
Combating Constantly Evolving Advanced Threats – Solution Architecture
Combating Constantly Evolving Advanced Threats – Solution ArchitectureCombating Constantly Evolving Advanced Threats – Solution Architecture
Combating Constantly Evolving Advanced Threats – Solution Architecture
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security SolutionMobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
 
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
 
Ransomware
RansomwareRansomware
Ransomware
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
 
Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperMan in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaper
 
Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service
 
Online Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat ModelOnline Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat Model
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Improving Network Security with IP &DNS Reputation Services
Improving Network Security with IP &DNS Reputation ServicesImproving Network Security with IP &DNS Reputation Services
Improving Network Security with IP &DNS Reputation Services
 
Script based malware detection in online banking
Script based malware detection in online bankingScript based malware detection in online banking
Script based malware detection in online banking
 
Secure client
Secure clientSecure client
Secure client
 

Último

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Último (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

CSI2008 Gunter Ollmann Man-in-the-browser

  • 1. Man-in-the-Browser Attack Vectors Gunter Ollmann – Chief Security Strategist IBM Internet Security Systems gollmann@us.ibm.com http://blogs.iss.net/ IBM Date/Time: Tuesday (November 18, 2008)   4:00pm - 5:00pm Topic: Web 2.0
  • 2.
  • 3.
  • 5.
  • 6.
  • 7.
  • 8. Man-in-the- Middle – old news?
  • 9.
  • 10.
  • 11.  
  • 12.
  • 13. Intercepting Traffic – Man-in-the-browser Trojan Application Local Proxy Agent OS Hooking Keyloggers, Screen grabber TCP/IP Stack Interception Packet inspection, pre/post SSL logging System Reconfiguration DNS Settings, Local HOST file, Routing tables, WPAD and Proxy settings Traditional Malware Operates and intercepts data at points through which the Web browser must communicate Man-in-the-browser Malware hooks inside the Web browser
  • 14. API Hooking Malware Application The Web browser WinInet httpsendrequest(), navigateto() Winsock TCP/IP stack Clean System Internet Malware Proxying Web browser data . Application The Web browser WinInet httpsendrequest(), navigateto() Winsock TCP/IP stack Internet Infected System Manipulate Copy, redirect, script, change, insert, sell.
  • 15.
  • 17.
  • 18.
  • 19. MITB – Grabbing Login Credentials Original pre-login fields UID, password & site Modified pre-login fields Now with ATM details and MMN New fields added MITB malware inserted additional fields. Records them, and sends them to the attacker
  • 20. MITB – Grabbing Login Credentials Modified pre-login fields Now with ATM details and MMN Programmable Interfaces Malware authors developing an extensible platform that can be sold or rented to other criminals Configuration files XML support, dynamic updates
  • 22.
  • 23. MITB – State-of-the-art Banking Proxy Trojan Attacker makes off with the money and the victim is unaware a transaction has occurred Victim logs in to the bank “securely” and banks “normally” Proxy Trojan starts functioning once the victim logs in Intercepts each transaction Calculates what is supposed to be in the account Modifies the page that appears to the victim Steals some money
  • 24. Honing in on the Transaction Customer logs in Authenticates successfully and securely Transfers Customer navigates to the fund transfer interface Validation Customer asked to provide a validation key for the transaction – may include a bank-issued “salt” value 2 nd Submission Customer clicks “Submit” to proceed Confirmation Transfer complete Transaction Validation As an anti-keylogger and anti-replay technique, some banking applications require the use of a separate “ validation” code for each transaction Payment Details The customer proceeds with entering transfer details (from, to, value, when, etc.) Submission Customer clicks “Submit” to proceed Submit Submit
  • 25. Honing in on the Transaction – Malware Injection 2 nd Submission Customer clicks “Submit” to proceed Payment Details Customer enters their transfer payment details Background Malware In the background, the proxy Trojan has created it’s own transfer details Submission Customer clicks “Submit” to proceed Validation Customer asked to provide a validation key for the transaction – maybe including a bank-issued “salt” value Malware Fakes The malware fakes a “validation failure” even though the fake transaction worked. Prompts user to “try again” 2 nd Validation Customer enters another validation code 3 rd Submission Malware submits the original “real” customer transfer information Confirmation 2 nd transation is confirmed back to the customer. In reality, two transfers have been conducted Submit Submit Submit
  • 26.
  • 27. Social Engineering past CAP Transfers - Original Transaction Validation Assuming the customer has already logged in, they must successfully navigate multiple pages to complete a funds transfer.  Page (1) Which FROM account? Page (2) How much? Where TO? Page (3) Are details correct? Page (4) CAP instructions and CODE? Page (5) Validation complete!
  • 28. Social Engineering past CAP Transfers - Injected  Transaction Monitoring The malware continuously monitors the customer as they navigate the pages to conduct a funds transfer HTML Page Insertion An extra page is inserted in to the transfer sequence and requests an additional CAP “ Security Code”. Page (1) Which FROM account? Page (2) How much? Where TO? Page (3) Are details correct? Page (4) CAP instructions and CODE? Page (5) Security CODE? Page (6) Validation complete!
  • 29.
  • 30.
  • 32.
  • 33.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.  
  • 41. Questions? Gunter Ollmann – Chief Security Strategist IBM Internet Security Systems gollmann@us.ibm.com http://blogs.iss.net/ IBM Date/Time: Tuesday (November 18, 2008)   4:00pm - 5:00pm Topic: Web 2.0