Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Friday October 04 2019, @05:11PM   Printer-friendly
from the now-that's-sneaky dept.

Kaspersky Warns of Encryption-Busting Reductor Malware:

Kaspersky says it has uncovered a new malware infection that is able to decode encrypted TLS traffic without the need to intercept or manipulate it.

Known as Reductor, the malware was spotted in April of this year[...].

"Besides typical RAT functions such as uploading, downloading and executing files, Reductor's authors put a lot of effort into manipulating digital certificates and marking outbound TLS traffic with unique host-related identifiers," Kaspersky explains.

[...] Rather than try to man-in-the middle traffic or steal keys, the Kaspersky team found that the Reductor malware works by infecting the browser (either Chrome or Firefox) itself.

"The solution that Reductor's developers found to mark TLS traffic is the most ingenious part," Kaspersky explained.

"They don't touch the network packets at all; instead developers analyzed the Firefox source code and Chrome binary code to patch the corresponding pseudo random number generation (PRNG) functions in the process's memory."

By compromising the random number generator, the malware's operators would know ahead of time how the traffic will be encrypted when the victim establishes a TLS connection, and have the ability to mark that traffic for later use. From there, the malware can easily decode the traffic and see what the transmitted data is, then send anything of interest back to the command server.

Because this data can be decoded, the attacker has no need to actually tamper with the traffic while it is in transit, and thus is able to function without alerting security tools or administrators that something is amiss.


Original Submission

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(1)
  • (Score: 3, Interesting) by Booga1 on Friday October 04 2019, @08:12PM

    by Booga1 (6333) on Friday October 04 2019, @08:12PM (#902773)

    Sounds familiar... I wonder if someone with enough resources might do this just to store everything and decrypt it all later? [wikipedia.org]

    The Utah Data Center, code-named Bumblehive, is the first Intelligence Community Comprehensive National Cyber-security Initiative (IC CNCI) data center designed to support the US intelligence community. The "massive data repository" is designed to cope with the large increase in digital data that has accompanied the rise of the global internet.

  • (Score: 1) by i286NiNJA on Friday October 04 2019, @08:13PM (6 children)

    by i286NiNJA (2768) on Friday October 04 2019, @08:13PM (#902774)

    Nation state action?

    Making this post because I want to see discussion on this story.

    • (Score: 0) by Anonymous Coward on Friday October 04 2019, @08:55PM (4 children)

      by Anonymous Coward on Friday October 04 2019, @08:55PM (#902786)

      Nation state action?

      Making this post because I want to see discussion on this story.

      Unfortunately most of the readership here any more don't even understand what the article is saying. Of course that doesn't stop many of them from commenting anyway. Carry on.

      • (Score: 3, Informative) by DannyB on Friday October 04 2019, @09:25PM (3 children)

        by DannyB (5839) Subscriber Badge on Friday October 04 2019, @09:25PM (#902803) Journal

        It seemed simple enough to understand for an idiot such as myself. Mess with PRNG and key generation so that a key was constructed with fewer random bits and more known value bits. (even if known value bits are some function of the few random bits) Store communication in a Utah data center owned by a government agency. But no such agency would claim to own it. Then this non existent agency would brute force crack the communications. They don't have to search the entire keyspace because the key has much fewer than expected truly random bits, and the remaining bits are somehow predictable from the few truly random ones. Suppose, for example, that all TLS keys used on your machine fall into a keyspace of 2^64 (65536). It doesn't take long to do 65536 tries to brute force the key decrypt the communications.

        Meanwhile, everyone is blissfully unaware. Everything looks great. No obvious tampering with the encrypted data because there was no tampering with the encrypted data. Tampering was done with the key generation.

        I find it easy to believe no such agency of any government would want to do something like this.

        But also various hacking groups might want to do something like this.

        Our own government wants to do away with our ability to have private communications, asking FacesBook to do away with end to end encryption.

        In 2013, Snowden showed us that all of our most paranoid theories about government surveillance were not nearly paranoid enough.

        --
        The anti vax hysteria didn't stop, it just died down.
        • (Score: 3, Informative) by coolgopher on Saturday October 05 2019, @02:04AM (2 children)

          by coolgopher (1157) Subscriber Badge on Saturday October 05 2019, @02:04AM (#902907)

          You meant 2^16, not 2^64. Unless your reality is quirkier than mine.

          • (Score: 4, Informative) by DannyB on Saturday October 05 2019, @02:41PM (1 child)

            by DannyB (5839) Subscriber Badge on Saturday October 05 2019, @02:41PM (#903085) Journal

            Not enough caffeine. I even thought I typed 16

            --
            The anti vax hysteria didn't stop, it just died down.
            • (Score: 2) by coolgopher on Sunday October 06 2019, @01:47AM

              by coolgopher (1157) Subscriber Badge on Sunday October 06 2019, @01:47AM (#903257)

              Better when it happens in a social post than actual code :D

              But yeah, it definitely read as a muscle memory typo than actual ignorance.

    • (Score: 3, Interesting) by NotSanguine on Friday October 04 2019, @11:08PM

      by NotSanguine (285) <NotSanguineNO@SPAMSoylentNews.Org> on Friday October 04 2019, @11:08PM (#902849) Homepage Journal

      Nation state action?

      Making this post because I want to see discussion on this story.

      Maybe. But not necessarily. While it's non-trivial to modify the affected libraries to carry out such a compromise, it's not so onerous that a decent programmer couldn't do this without the resources of a state actor.

      That said, YMMV.

      --
      No, no, you're not thinking; you're just being logical. --Niels Bohr
(1)