SlideShare a Scribd company logo
1 of 37
Download to read offline
FireEye’s 2013, 0 DAY THREAT REPORT
1
PERENTAGE OF JAR ATTACKS AMONGST
DRIVE BY DOWNLOAD
2
TARGETED ATTACKS
 CVE-2013-2465 used in strategic Web Compromise on an
Embassy.
Exploit was leveraged to disable security permissions, after which
malicious executable was executed, which initiated call back and in
the response base 64 embedded executable was served.
3
#RSAC
SESSION ID:
Abhishek Singh Varun Jain
INTO THE WORLD OF JAVA
APPLETS
HT-F02
Malware Researcher
FireEye
Senior Staff Research Scientist Engineer
FireEye
#RSAC
Attack Flow
ATTACK FLOW
 Vulnerability  Elevation of Privilege  Security
Manager Disabled  Download and Execute the
malware.
6
VULNERABILITIES
 Improper implementation of Java Runtime Environment
awt_ImagingLib.c
7
VULNERABILITIES
 Type Confusion
 Ex: CVE-2011-3521/CVE-2012-0507
8
VULNERABILITIES
 Type Confusion Example: CVE 2012-0507
9
VULNERABILITIES
 Improper implementation of base classes
Bug inside the base classes can be used to run privileged code from untrusted
code. Eg CVE 2013-5076
10
DIVE INTO THE EXPLOITATION BYJAVA
 Live Demo
11
EXPLOITATION BASED UPON THE OPERATING
SYSTEM
12
USING EXPIRED CERTIFICATES
13
OBFUSCATION FLOW STEPS
 obfuscated string => decrypting function => parameter to the
function
14
OBFUSCATION
15
#RSAC
CHALLENGES FOR A FILE
BASED SANDBOX.
HTML PAGE FOR EXECUTION
17
Network Connectivity
18
RIGHT ENVIRONMENT
 CVE-2012-0507 :
Java SE 7 Update 2, 6 Update 30, 5.0 Update 33
19
#RSAC
Malicious Indicators
Obfuscation
 Hide the Data , name of URL, file name
 Data Obfuscation :
21
METRICS TO DETERMINE OBFUSCATION
 N-gram, Entropy and Word Size
 N-gram checks for the probability of occurrence of certain
sequence based upon the good and the bad sample set
 Entropy checks for the distribution of the used bytes codes
 Word Size checks if very long strings are used
22
DATA OBFUSCATION
23
FUNCTIONAL OBFUSCATION
 Hide the function Names By Using reflection API calls.
Two Steps Process:
a. Create the Obfuscated API calls.
b. Use Reflection API to call at the runtime.
24
API’s FOR RETRIVING CLASS NAMES
 Class.forName()
 Object.getClass()
Access to Fields, Methods, and Constructors of the Class
a. getMethod()
b. getField()
25
MALICIOUS INDICATORS:
NAMES OF THE CLASS FILES.
26
N-GRAM ANALYSIS ON CLASS NAMES
 Accuracy ~ 90%.
27
#RSAC
DESIGN ARCHITECTURE
FOR A DETECTION MODEL
FEATURES IN A DETECTION MODEL
 Correlation between the static using probabilistic and Machine
learning Algorithms, dynamic behavior and the network
communication is a must .
29
FEATURES FOR A DETECTION MODEL
 Multi Flow Analysis of a network stream is must.
30
DESIGN ARCHITECTURE
 Multi Vector Multi Flow analysis providing correlation between the
static dynamic and network behavior of a file.
31
SUMMARY
 JAR attacks are complex make use of obfuscation, reflection to prevent
the static analysis which provides challenge to static scanning.
 Detonation of the JAR inside the file based sandboxes require the input
parameters, live internet connection, right version which yet provided
challenge to the file based sandbox.
 Multi Vector and Multi Flow analysis is must for detection of JAR.
32
SO WHAT SHOULD WE DO ?
 Ensure latest version java plugin is installed on client browser.
 Leverage and use the Java security policy built around certificate
signing.
 Make an educated decision about use of Java Plugin.
 Detection solution at the Perimeter : Automated Analysis System
leveraging correlation is must to detect and prevent sophisticated
unknown jar applet attacks
 File based sandbox will fail to analyze the behavior of malicious jar.
These are designed as a research tool.
 Static Scanning has limitations .
33
Q&A
34
REFERENCES
 Brewing up Trouble: Analyzing the four widely exploited Java
Vulnerabilities.
https://www.fireeye.com/content/dam/legacy/resources/pdfs/fireey
e-java-vulnerabilities.pdf.
 A daily grind : Filtering Java Vulnerabilities. I
https://www.fireeye.com/content/dam/legacy/resources/pdfs/fireeye
-a-daily-grind-filtering-java-vulnerabilities.pdf
35
ACKNOWLEDGEMENTS
 We would like to express gratitude to Anirban Das and Ali Mesdaq,
our colleagues at FireEye, for their help with NGRAM analysis.
36
Contact Information
 Varun Jain
Email : varun.jain@fireeye.com
 Abhishek Singh:
Email : abhishek.singh@fireeye.com
37

More Related Content

What's hot

Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong
Popular Approaches to Preventing Code Injection Attacks are Dangerously WrongPopular Approaches to Preventing Code Injection Attacks are Dangerously Wrong
Popular Approaches to Preventing Code Injection Attacks are Dangerously WrongWaratek Ltd
 
Machine Learning in Malware Detection
Machine Learning in Malware DetectionMachine Learning in Malware Detection
Machine Learning in Malware DetectionKaspersky
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSalil Kumar Subramony
 
Advanced red teaming all your badges are belong to us
Advanced red teaming  all your badges are belong to usAdvanced red teaming  all your badges are belong to us
Advanced red teaming all your badges are belong to usPriyanka Aash
 
Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, an...
Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, an...Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, an...
Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, an...Microsoft Tech Community
 
7 Reasons Your Applications are Attractive to Adversaries
7 Reasons Your Applications are Attractive to Adversaries7 Reasons Your Applications are Attractive to Adversaries
7 Reasons Your Applications are Attractive to AdversariesDerek E. Weeks
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssueIshan Girdhar
 
The Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxThe Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxCheckmarx
 
Security precognition chaos engineering in incident response
Security precognition  chaos engineering in incident responseSecurity precognition  chaos engineering in incident response
Security precognition chaos engineering in incident responsePriyanka Aash
 
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...Sonatype
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeDigital Defense Inc
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Moataz Kamel
 
Application Security Guide for Beginners
Application Security Guide for Beginners Application Security Guide for Beginners
Application Security Guide for Beginners Checkmarx
 
Secure Coding for Java - An Introduction
Secure Coding for Java - An IntroductionSecure Coding for Java - An Introduction
Secure Coding for Java - An IntroductionSebastien Gioria
 
We explain the security flaw that's freaking out the internet
We explain the security flaw that's freaking out the internetWe explain the security flaw that's freaking out the internet
We explain the security flaw that's freaking out the internetaditi agarwal
 
The Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsThe Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsKaspersky
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Blue Coat
 
Infrastructure as (Secure) Code
Infrastructure as (Secure) CodeInfrastructure as (Secure) Code
Infrastructure as (Secure) CodeMark Nunnikhoven
 
Application Security Management with ThreadFix
Application Security Management with ThreadFixApplication Security Management with ThreadFix
Application Security Management with ThreadFixVirtual Forge
 
CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA InfographicBlue Coat
 

What's hot (20)

Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong
Popular Approaches to Preventing Code Injection Attacks are Dangerously WrongPopular Approaches to Preventing Code Injection Attacks are Dangerously Wrong
Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong
 
Machine Learning in Malware Detection
Machine Learning in Malware DetectionMachine Learning in Malware Detection
Machine Learning in Malware Detection
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
Advanced red teaming all your badges are belong to us
Advanced red teaming  all your badges are belong to usAdvanced red teaming  all your badges are belong to us
Advanced red teaming all your badges are belong to us
 
Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, an...
Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, an...Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, an...
Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, an...
 
7 Reasons Your Applications are Attractive to Adversaries
7 Reasons Your Applications are Attractive to Adversaries7 Reasons Your Applications are Attractive to Adversaries
7 Reasons Your Applications are Attractive to Adversaries
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
 
The Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxThe Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's Toolbox
 
Security precognition chaos engineering in incident response
Security precognition  chaos engineering in incident responseSecurity precognition  chaos engineering in incident response
Security precognition chaos engineering in incident response
 
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
 
Application Security Guide for Beginners
Application Security Guide for Beginners Application Security Guide for Beginners
Application Security Guide for Beginners
 
Secure Coding for Java - An Introduction
Secure Coding for Java - An IntroductionSecure Coding for Java - An Introduction
Secure Coding for Java - An Introduction
 
We explain the security flaw that's freaking out the internet
We explain the security flaw that's freaking out the internetWe explain the security flaw that's freaking out the internet
We explain the security flaw that's freaking out the internet
 
The Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsThe Duqu 2.0: Technical Details
The Duqu 2.0: Technical Details
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
Infrastructure as (Secure) Code
Infrastructure as (Secure) CodeInfrastructure as (Secure) Code
Infrastructure as (Secure) Code
 
Application Security Management with ThreadFix
Application Security Management with ThreadFixApplication Security Management with ThreadFix
Application Security Management with ThreadFix
 
CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA Infographic
 

Viewers also liked

Promise_Indiana_Biz_Voice
Promise_Indiana_Biz_VoicePromise_Indiana_Biz_Voice
Promise_Indiana_Biz_VoiceJason Callahan
 
fireeye-hot-knives-through-butter(1)
fireeye-hot-knives-through-butter(1)fireeye-hot-knives-through-butter(1)
fireeye-hot-knives-through-butter(1)Abhishek Singh
 
Omasco Profile
Omasco ProfileOmasco Profile
Omasco ProfileJIJO JACOB
 
Heather Wallin
Heather WallinHeather Wallin
Heather WallinHeatwall
 
Ethics and law in school counseling
Ethics and law in school counselingEthics and law in school counseling
Ethics and law in school counselingKimberly Melton
 
Ethics and law in school counseling
Ethics and law in school counselingEthics and law in school counseling
Ethics and law in school counselingKimberly Melton
 
Applied and clinical anatomy of lower limb
Applied and clinical anatomy of lower limbApplied and clinical anatomy of lower limb
Applied and clinical anatomy of lower limbdrjabirwase
 

Viewers also liked (9)

Promise_Indiana_Biz_Voice
Promise_Indiana_Biz_VoicePromise_Indiana_Biz_Voice
Promise_Indiana_Biz_Voice
 
fireeye-hot-knives-through-butter(1)
fireeye-hot-knives-through-butter(1)fireeye-hot-knives-through-butter(1)
fireeye-hot-knives-through-butter(1)
 
Omasco Profile
Omasco ProfileOmasco Profile
Omasco Profile
 
Heather Wallin
Heather WallinHeather Wallin
Heather Wallin
 
Ethics and law in school counseling
Ethics and law in school counselingEthics and law in school counseling
Ethics and law in school counseling
 
Ethics and law in school counseling
Ethics and law in school counselingEthics and law in school counseling
Ethics and law in school counseling
 
Geetha Prakash Resume1
Geetha Prakash Resume1Geetha Prakash Resume1
Geetha Prakash Resume1
 
isalmrashed cv
isalmrashed cvisalmrashed cv
isalmrashed cv
 
Applied and clinical anatomy of lower limb
Applied and clinical anatomy of lower limbApplied and clinical anatomy of lower limb
Applied and clinical anatomy of lower limb
 

Similar to ht-f02-inside-the-world-of-java-applets_final

Static Detection of Application Backdoors
Static Detection of Application BackdoorsStatic Detection of Application Backdoors
Static Detection of Application BackdoorsTyler Shields
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET Journal
 
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill ChainOrchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill ChainPriyanka Aash
 
Java: A Secure Programming Language for Today's Market
Java: A Secure Programming Language for Today's MarketJava: A Secure Programming Language for Today's Market
Java: A Secure Programming Language for Today's MarketUncodemy
 
Serverless - minimizing the attack surface
Serverless - minimizing the attack surfaceServerless - minimizing the attack surface
Serverless - minimizing the attack surfaceAvi Shulman
 
Devoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackDevoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackIJRESJOURNAL
 
[DSBW Spring 2009] Unit 08: WebApp Security
[DSBW Spring 2009] Unit 08: WebApp Security[DSBW Spring 2009] Unit 08: WebApp Security
[DSBW Spring 2009] Unit 08: WebApp SecurityCarles Farré
 
Realities of Security in the Cloud - CSS ATX 2017
Realities of Security in the Cloud - CSS ATX 2017Realities of Security in the Cloud - CSS ATX 2017
Realities of Security in the Cloud - CSS ATX 2017Alert Logic
 
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...Yuji Kosuga
 
Qg was guide
Qg was guideQg was guide
Qg was guidenat page
 
Web Application Security Guide by Qualys 2011
Web Application Security Guide by Qualys 2011 Web Application Security Guide by Qualys 2011
Web Application Security Guide by Qualys 2011 nat page
 
IRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET Journal
 
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】Hacks in Taiwan (HITCON)
 
AppSec California 2016 - Making Security Agile
AppSec California 2016 - Making Security AgileAppSec California 2016 - Making Security Agile
AppSec California 2016 - Making Security AgileOleg Gryb
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 

Similar to ht-f02-inside-the-world-of-java-applets_final (20)

Static Detection of Application Backdoors
Static Detection of Application BackdoorsStatic Detection of Application Backdoors
Static Detection of Application Backdoors
 
Effectiveness of AV in Detecting Web Application Backdoors
Effectiveness of AV in Detecting Web Application BackdoorsEffectiveness of AV in Detecting Web Application Backdoors
Effectiveness of AV in Detecting Web Application Backdoors
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
 
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill ChainOrchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
 
Owasp masvs spain 17
Owasp masvs spain 17Owasp masvs spain 17
Owasp masvs spain 17
 
Java: A Secure Programming Language for Today's Market
Java: A Secure Programming Language for Today's MarketJava: A Secure Programming Language for Today's Market
Java: A Secure Programming Language for Today's Market
 
Serverless - minimizing the attack surface
Serverless - minimizing the attack surfaceServerless - minimizing the attack surface
Serverless - minimizing the attack surface
 
Devoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackDevoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection Attack
 
[DSBW Spring 2009] Unit 08: WebApp Security
[DSBW Spring 2009] Unit 08: WebApp Security[DSBW Spring 2009] Unit 08: WebApp Security
[DSBW Spring 2009] Unit 08: WebApp Security
 
FALCON.pptx
FALCON.pptxFALCON.pptx
FALCON.pptx
 
Realities of Security in the Cloud - CSS ATX 2017
Realities of Security in the Cloud - CSS ATX 2017Realities of Security in the Cloud - CSS ATX 2017
Realities of Security in the Cloud - CSS ATX 2017
 
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
 
Qg was guide
Qg was guideQg was guide
Qg was guide
 
Web Application Security Guide by Qualys 2011
Web Application Security Guide by Qualys 2011 Web Application Security Guide by Qualys 2011
Web Application Security Guide by Qualys 2011
 
IRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET- Sandbox Technology
IRJET- Sandbox Technology
 
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
 
AppSec California 2016 - Making Security Agile
AppSec California 2016 - Making Security AgileAppSec California 2016 - Making Security Agile
AppSec California 2016 - Making Security Agile
 
Unit 08: Security for Web Applications
Unit 08: Security for Web ApplicationsUnit 08: Security for Web Applications
Unit 08: Security for Web Applications
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
SOHIL_RM (1).pptx
SOHIL_RM (1).pptxSOHIL_RM (1).pptx
SOHIL_RM (1).pptx
 

ht-f02-inside-the-world-of-java-applets_final