Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/24/2006
08:17 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

JavaScript Malware Targets Intranets

Malware, cross-site scripting use browsers to break into intranets, with demo planned for next week's Black Hat conference

Browser, beware.

There's a chilling mode of attack quietly emerging that forces an unsuspecting browser into hacking into the user's own corporate intranet. From there, the attacker can scan the network, reconfigure network devices such as routers and firewalls, or even break into corporate payroll systems.

Attackers already use this JavaScript-based malware via cross-site scripting (XSS) to attack public Websites. But Jeremiah Grossman, founder and CTO of WhiteHat Security, will demonstrate at next week's Black Hat conference in Las Vegas how this method can just as easily hack into a corporate intranet. "This is going to be very powerful stuff," says Grossman, a former information security officer at Yahoo, whose job there was to gauge the security of the company's Web applications and, according to Grossman, to "hack Websites all day."

Grossman will show how intranets, which companies don't secure as tightly as their public-facing servers, are prime targets for these JavaScript-based attacks that use XSS to exploit weaknesses in an organization's Web applications and take control of its internal network devices. "Your browser can be fully patched, but when you visit a malware site, it can take complete control of your browser and use it to fingerprint or determine what devices there are on your network, discover internal IP addresses," and even conduct corporate espionage, he says. Steering clear of "bad" Websites won't protect you either, Grossman warns. "We're told you're more likely to get attacked or 'inspected' on popular Websites rather than bottom-edge ones."

Grossman will release his proof-of-concept code for these JavaScript-based intranet attacks at Black Hat, something he regrets he didn't do at last year's conference when he showed how attackers could use XSS in phishing exploits. XSS has become a popular phishing method. "By not releasing [the XSS phishing code] it ended up helping the bad guys more because they could write it, and the good guys didn't have the code to experiment with it."

XSS isn't new, and so far it's mostly been used on public Websites, Grossman says, such as the recent XSS phishing attack on PayPal. And the recent MySpace.com worm, meanwhile, also used JavaScript malware that infected over 1 million users within 24 hours and resulted in downtime on the popular social networking site. "Hypothetically, what [the attacker] did was relatively benign compared to what he could have achieved," Grossman says. "He had access to one million users and browsers," so imagine what kind of damage he could have done if he got corporate MySpace users' browsers to attack their own internal networks.

This type of exploit lets the attacker use the browser to reach other internal and external Web servers, too. "All data that bad guys want is on a Website somewhere," Grossman says. "So they take control of your browser and make your browser download illegal content. Every log would say you or your browser had done it. That's a scary [prospect] for a corporation."

If a user happens to be logged onto the targeted Website, the attacker gains even more power, Grossman says. "For example, if the user is logged into their Web bank, the attacker can do anything the user could, such as transferring money."

Grossman says WhiteHat Security, which provides vulnerability assessment services on an outsourcing basis, has found XSS in over 1,500 custom Web apps, and that eight out of 10 Websites are infected with XSS. "Unfortunately, there is no way to patch a client to protect against it. The vulnerability is on the Website itself" within the site's custom Web applications, he says. "We need sites to start fixing these vulnerabilities."

His Black Hat demos will feature a "hacker" using XSS to deface a Web-page and for phishing with a fake page sitting on a real Website. The coup de grace, though, will be a demo using XSS and JavaScript malware to scan ports and hack devices on an internal network.

Interestingly, Grossman says the hardest part was making the attacks visible for Black Hat attendees to see it. "Doing a hack is a lot easier than an on-stage demo," he says. "It's harder to make it visible so the audience can understand it."

- Kelly Jackson Higgins, Senior Editor, Dark Reading

  • WhiteHat Security
  • Black Hat Inc. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Sodinokibi Ransomware: Where Attackers' Money Goes
    Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
    Data Privacy Protections for the Most Vulnerable -- Children
    Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
    7 SMB Security Tips That Will Keep Your Company Safe
    Steve Zurier, Contributing Writer,  10/11/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win a Starbucks Card! Click Here
    Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    2019 Online Malware and Threats
    2019 Online Malware and Threats
    As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-17513
    PUBLISHED: 2019-10-18
    An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur.
    CVE-2019-8216
    PUBLISHED: 2019-10-17
    Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
    CVE-2019-8217
    PUBLISHED: 2019-10-17
    Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
    CVE-2019-8218
    PUBLISHED: 2019-10-17
    Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
    CVE-2019-8219
    PUBLISHED: 2019-10-17
    Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .