Stories
Slash Boxes
Comments

SoylentNews is people

posted by hubie on Wednesday May 17, @09:40PM   Printer-friendly

If you think a password prevents scanning in the cloud, think again:

Microsoft cloud services are scanning for malware by peeking inside users' zip files, even when they're protected by a password, several users reported on Mastodon on Monday.

Compressing file contents into archived zip files has long been a tactic threat actors use to conceal malware spreading through email or downloads. Eventually, some threat actors adapted by protecting their malicious zip files with a password the end user must type when converting the file back to its original form. Microsoft is one-upping this move by attempting to bypass password protection in zip files and, when successful, scanning them for malicious code.

While analysis of password-protected files in Microsoft cloud environments is well-known to some people, it came as a surprise to Andrew Brandt. The security researcher has long archived malware inside password-protected zip files before exchanging them with other researchers through SharePoint. On Monday, he took to Mastodon to report that the Microsoft collaboration tool had recently flagged a zip file, which had been protected with the password "infected."

[...] Fellow researcher Kevin Beaumont joined the discussion to say that Microsoft has multiple methods for scanning the contents of password-protected zip files and uses them not just on files stored in SharePoint but all its 365 cloud services. One way is to extract any possible passwords from the bodies of an email or the name of the file itself. Another is by testing the file to see if it's protected with one of the passwords contained in a list.

"If you mail yourself something and type something like 'ZIP password is Soph0s', ZIP up EICAR and ZIP password it with Soph0s, it'll find (the) password, extract and find (and feed MS detection)," he wrote.

[...] The practice illustrates the fine line online services often walk when attempting to protect end users from common threats while also respecting privacy. As Brandt notes, actively cracking a password-protected zip file feels invasive. At the same time, this practice almost surely has prevented large numbers of users from falling prey to social engineering attacks attempting to infect their computers.

One other thing readers should remember: password-protected zip files provide minimal assurance that content inside the archives can't be read. As Beaumont noted, ZipCrypto, the default means for encrypting zip files in Windows, is trivial to override. A more dependable way is to use an AES-256 encryptor built into many archive programs when creating 7z files.


Original Submission

 
This discussion was created by hubie (1068) for logged-in users only. Log in and try again!
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Insightful) by krishnoid on Thursday May 18, @05:33AM (10 children)

    by krishnoid (1156) on Thursday May 18, @05:33AM (#1306805)

    Probably a trivial suggestion, but did you try uploading it to Google Docs, or letting LibreOffice have a crack at it?

    Starting Score:    1  point
    Moderation   +1  
       Insightful=1, Total=1
    Extra 'Insightful' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 4, Funny) by Reziac on Thursday May 18, @06:12AM (9 children)

    by Reziac (2489) on Thursday May 18, @06:12AM (#1306807) Homepage

    LibreOffice threw it back. So did Word. Got farthest with WinRAR -- managed to extract the background graphic, that was it. PKZipFix and 7Zip didn't get that far, tho could see some filenames. Appears the ZIP header is messed up.

    Also assaulted it with a hex editor, but couldn't tell what was broken.

    It's a client's file ... apparently Word corrupted the document during the final save-to-disk (did not appear to be a disk error), and by the time it was noticed, the bad copy had replaced the backups. (Client did not understand how to do incrementals.) Client didn't want to pay for the commercial solutions, which one strongly suspects are just PKZipFix in a GUI wrapper. The one trial version I messed with didn't accomplish anything.

    That was the day I began railing against ZIP containers as a document save format. (ODT too.) I now beat my clients with a stick until they see the merits of RTF, which at least I can hand-fix at need.

    Thanks for trying, tho ... it's very frustrating. Client lost an entire finished novel, six months of work. (And I hate being defeated by mere software.)

    --
    And there is no Alkibiades to come back and save us from ourselves.
    • (Score: 3, Funny) by Mojibake Tengu on Thursday May 18, @09:06AM (6 children)

      by Mojibake Tengu (8598) on Thursday May 18, @09:06AM (#1306819) Journal

      Client lost an entire finished novel

      True writers write LaTex in texmaker. And use mercurial. Or at least git.

      --
      The edge of 太玄 cannot be defined, for it is beyond every aspect of design
      • (Score: 3, Touché) by maxwell demon on Thursday May 18, @09:10AM (4 children)

        by maxwell demon (1608) Subscriber Badge on Thursday May 18, @09:10AM (#1306820) Journal

        LaTeX and mercurial, sure. But texmaker? No way. Either vi or Emacs.

        --
        The Tao of math: The numbers you can count are not the real numbers.
        • (Score: 3, Funny) by Mojibake Tengu on Thursday May 18, @11:03AM

          by Mojibake Tengu (8598) on Thursday May 18, @11:03AM (#1306827) Journal

          Psst! Too heavy indoctrination does not apply well on beginners. While nurturing GUI-dependent digital toddlers, tread lightly...

          --
          The edge of 太玄 cannot be defined, for it is beyond every aspect of design
        • (Score: 3, Funny) by Reziac on Thursday May 18, @01:02PM (2 children)

          by Reziac (2489) on Thursday May 18, @01:02PM (#1306838) Homepage

          Well do I remember my first (and last) encounter with Emacs...

          Could not for the life of me figure out how to exit the durn thing, had somehow got it fullscreen, and wound up hitting reset to get out of it.

          In my defense, I think it was also my second encounter with anything in the *NIX sphere (the first having been the Darwin PC beta... "Okay, it took two days to download on dialup, it installed, and I have a command line -- largest installed CLI in the history of computing. What do I =do= with it??")

          --
          And there is no Alkibiades to come back and save us from ourselves.
          • (Score: 2) by HiThere on Thursday May 18, @01:59PM (1 child)

            by HiThere (866) on Thursday May 18, @01:59PM (#1306842) Journal

            I tried EMACS 3 or 4 times. It seemed like with so many proponents that HAD to be some good aspect. I was unable to find it. Even vi is better. (Note: I started off using things like ed, or ptss, but that didn't make me prefer that interface. These days I normally use geany.)

            Also, however, the original claim was that "writers" should use it. This does NOT mean programmers. Programmers are an extremely small subset of writers, and have quite different needs from most of them.

            --
            Javascript is what you use to allow unknown third parties to run software you have no idea about on your computer.
            • (Score: 2) by Reziac on Thursday May 18, @02:48PM

              by Reziac (2489) on Thursday May 18, @02:48PM (#1306849) Homepage

              Yeah, that was where I was with Emacs... it's such a big deal, it should be great, right?? RIGHT?!

              Not a programmer but I like Kate, tho mostly use it as a Notepad replacement. Unfortunately we do not seem to even =have= a proper, dedicated RTF editor on linux. Or =any= RTF editor. (No, LibreOffice doesn't count, have you =seen= what it does to the formatting??! I can hand-write the formatting codes faster than I can clean that up.)

              And everyone knows that REAL programmers do COPY CON PROGRAM.ZIP :D

              --
              And there is no Alkibiades to come back and save us from ourselves.
      • (Score: 2) by Reziac on Thursday May 18, @12:57PM

        by Reziac (2489) on Thursday May 18, @12:57PM (#1306837) Homepage

        REAL programmers do COPY CON PROGRAM.ZIP

        :D

        --
        And there is no Alkibiades to come back and save us from ourselves.
    • (Score: 2) by DannyB on Thursday May 18, @06:42PM (1 child)

      by DannyB (5839) Subscriber Badge on Thursday May 18, @06:42PM (#1306884) Journal

      That was the day I began railing against ZIP containers as a document save format.

      Let me introduce you to Java's JAR files. Those are the Java platform-neutral executable equivalent of EXE and DLL.

      They are zip files as an executable file or dynamic library format.

      However they are platform neutral, this compiled code will run on a Raspberry PI or a giant IBM mainframe with strange processor architecture.

      --
      While Republicans can get over Trump's sexual assaults, affairs, and vulgarity; they cannot get over Obama being black.
      • (Score: 2) by Reziac on Thursday May 18, @07:48PM

        by Reziac (2489) on Thursday May 18, @07:48PM (#1306891) Homepage

        Yep, there's an advantage... have peeked inside JARs, as I do any unfamiliar file. A habit developed in the ancient DOS era, when I'd peer at everything with Vern Buerg's LIST.

        RPMs too... have occasionally unpacked an RPM and run whatever directly, rather than installing it. Poor man's container; that way it doesn't touch the OS.

        --
        And there is no Alkibiades to come back and save us from ourselves.