funsec mailing list archives
Re: idea
From: Ben Li <banjili () gmail com>
Date: Thu, 01 Jan 2009 22:28:49 -0700
Hello Randall, As a lurker, a part time system administrator, and an ex-developer, I offer the following (slightly vague for public consumption). I read from your original post the following assumptions about a worst-case scenario of an infected machine: 1) DNS is locally compromised and unreliable. 2) All of the web browsers on the infected machine are compromised and unreliable with respect to the types of content they will access and store, and specifically will not download executable binaries which are assumed to contain anti-maware capabilities. Your identified problem seems to be that you want to easily locate and retrieve remote resources using an infected machine, under the above conditions. The general form of the solution, then, is to functionally relocate DNS-like functionality, and content transfer functionality up the network stack into layers not typically patrolled by the malware. Those conditions leave at least the following unblockable vector for delivering an executable payload: 1) The previous suggestion of housing the payload in a widely available and widely distributed system (Akami) is wise. Google, Wikipedia, twitter, facebook, blogs, hotmail and at least several other popular websites must remain accessible on the infected machine in order for the user not to reformat it, thereby killing the infection. 2) As established, Akami is difficult and expensive to play with. The umpteen other unblockable sites which host user-generated content are neither difficult, nor expensive to play with. By now, you've probably realized that any solution pattern for this problem, given assumptions 1 and 2, will have the consequence of being difficult to detect or stop via legitimate network security tools, and of consequence, such solution patterns may also be employed by the malware authors to deploy very resilient C+C networks, hence, my reluctance to even mention that this idea is possible. I've been mostly inactive in this part of computer security for several years, so I don't know if this abuse of non-blockable user-generated content injection is a new idea. (I know that link spammers are insanely effective at content injection already, albeit for different purposes.) I've not seen it described in the Di(e|t)trich papers from this fall. If you know of any references, or if you find some flaw in the above reasoning about the potential threat, a quick note would would be appreciated. If, on the other hand, this is a new type of legitimate threat, I look forward to working with you to ensure that the right people are at least made aware that it exists. Happy new year, -Ben Li MA Candidate, University of Calgary RandallM wrote:
ok, I am drinking, after all it is the NYE celebration. But, I had this idea pop in. Remember, it is a "first thought idea". That means I am in need of input to brainstorm with me on it. Here is the initial thought: When fixing infected computers I find that: 1. most people don't have programs installed for preventive much less combative 2. depending on the infection one cannot download programs or go to "helpful" sites to use. malware sites often rotate IP or DNS in order to "hide". Thought: Why can't we using the same type of process provide access to programs and or sites in the same manor so that the malware infections cannot "block" because the sites are not permanant? Symantec is and always will be "www.symantec.com <http://www.symantec.com>", as with other sites. they are blocked by malware infections (in various ways that I would love to understand more). If there were "server" around the globe open with online scanners and tools that rotated with DNS and or IP addressing the malware could not block it. Can this be done with a revolving network of servers from volunteers? Make sense or have I already drank too much? -- been great, thanks Big R ------------------------------------------------------------------------ _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
_______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
Current thread:
- Re: idea, (continued)