Sunteți pe pagina 1din 76

HPE Security Research

Cyber Risk Report 2015


Table of contents

3 Introduction 36 Top Android malware families in 2014


4 About Hewlett Packard Enterprise Security Research 36 Notable Android malware in 2014
4 Our data 39 Conclusion
4 Key themes
40 Risks: Spotlight on privacy
6 The security conversation
42 Exposures
8 Threat actors 42 Emerging avenues for compromise: POS and IoT
8 Nation-state supported activity 42 The evolution of POS malware
12 The cyber underground 46 The Internet of Things
12 Conclusion 49 Conclusion

13 Vulnerabilities and exploits 49 Controls


15 Weaknesses in enterprise middleware 50 Distribution by kingdom
15 Vulnerability and exploits trends in 2014 52 Breakdown of top five Web application vulnerabilities
(Windows case) 53 Top 10 Web application vulnerabilities
18 Malware and exploits 55 Breakdown of the top five mobile application
18 Top CVE-2014 numbers collected in 2014 vulnerabilities
19 Top CVE-2014 for malware attacks 56 Top 10 mobile application vulnerabilities
20 Top CVE numbers seen in 2014 58 Open source software dependencies
22 Defenders are global 62 The Heartbleed effect
23 Conclusion 64 Remediation of static issues
67 Conclusion
24 Threats
24 Windows malware overview 68 Summary
27 Notable malware
29 Proliferation of .NET malware in 2014 70 Authors and contributors
31 ATM malware attacks
32 Linux malware
34 Mobile malware 71 Glossary
35 Android anti-malware market
Editors’ note: While our previous Cyber
Risk Reports were numbered according to
Introduction
the year of data covered (e.g., “Cyber Risk Welcome to the HPE Cyber Risk Report 2015. In this report we provide a broad view of the
Report 2013” was released in 2014), we 2014 threat landscape, ranging from industry-wide data down to a focused look at different
are updating our numbering convention
to match industry practices.
technologies, including open source, mobile, and the Internet of Things. The goal of this
Report is to provide security information leading to a better understanding of the threat
landscape, and to provide resources that can aid in minimizing security risk.

It is my pleasure to welcome you to our 2015 Cyber Risk Report. HPE Security Research publishes many
documents throughout the year detailing our research and findings, but our annual Risk Report stands slightly
removed from the day-to-day opportunities and crises our researchers and other security professionals face.

A look back at security developments over the course of a full year serves an important purpose for those
charged with shaping enterprise security responses and strategies. In the wake of the significant breaches of
2014, I believe it’s more important than ever that our cyber security research team continues to provide an
elevated perspective on the overall trends in the marketplace.

The global economic recovery continued this year, and it was probably inevitable that as businesses
rebounded, the security challenges facing them became more complex. Enterprises continued to find
inexpensive access to capital; unfortunately, so did adversaries, some of whom launched remarkably
determined and formidable attacks over the course of the year as documented by our field intelligence team.

Our researchers saw that despite new technologies and fresh investments from both adversaries and
defenders alike, the security realm is still encumbered by the same problems—even in some cases by the
very same bugs—that the industry has been battling for years. The work of our threat research and software
security research teams revealed vulnerabilities in products and programs that were years old—in a few cases,
decades old. Well-known attacks were still distressingly effective, and misconfiguration of core technologies
continued to plague systems that should have been far more stable and secure than they in fact proved to be.

We are, in other words, still in the middle of old problems and known issues even as the pace of the security
world quickens around us. Our cyber security research team has expanded over the course of the year, and
so has this Risk Report, both covering familiar topics in greater depth and adding coverage of allied issues
such as privacy and Big Data. In addition, our people work to share their findings and their passion for security
and privacy research with the industry and beyond. This Risk Report is one form of that; our regular Security
Briefings and other publications are another form, and we hope to remain in touch with you throughout the
year as themes presented in this Report are developed in those venues.

Security practitioners must ready themselves for greater public and industry scrutiny in 2015, and we know
that threat actors—encouraged by public attention paid to their actions—will continue their attempts to
disrupt and capitalize on bugs and defects. The HPE Security Research group continues to prepare for the
challenges the year will doubtless pose, and also intends to invest in driving our thought leadership inside the
security community and beyond it.

Art Gilliland
SVP and General Manager, Enterprise Security Products
About Hewlett Packard exploits may have garnered more attention
in the press, attacks from years gone by
Enterprise Security Research still pose a significant threat to enterprise
security. Businesses should employ a
HPE Security Research (HPSR) conducts
comprehensive patching strategy to ensure
innovative research in multiple focus areas.
systems are up to date with the latest
We deliver security intelligence across
security protections to reduce the likelihood
the portfolio of HPE security products
of these attacks succeeding.
including HPE ArcSight, HPE Fortify, and
HPE TippingPoint. In addition, our published
Theme #2: Misconfigurations are still
research provides vendor-agnostic insight
a problem
and information throughout the public and
The HPE Cyber Risk Report 2013
private security ecosystems.
documented how many vulnerabilities
reported were related to server
Security research publications and
misconfiguration. The trend is very similar
regular security briefings complement the
again in 2014, with server misconfiguration
intelligence delivered through HPE products
being the number-one issue across all
and provide insight into present and
analyzed applications in this category. Our
developing threats. HPSR brings together
findings show that access to unnecessary
data and research to produce a detailed
files and directories seems to dominate
picture of both sides of the security coin—
the misconfiguration-related issues. The
the state of the vulnerabilities and threats
information disclosed to attackers through
comprising the attack surface, and, on the
these misconfigurations provides additional
flip side, the ways adversaries exploit those
avenues of attack and allows attackers
weaknesses to compromise victims. Our
the knowledge needed to ensure their
continuing analysis of threat actors and the
other methods of attack succeed. Regular
methods they employ guides defenders to
penetration testing and verification of
better assess risk and choose appropriate
configurations by internal and external
controls and protections.
entities can identify configuration errors
before attackers exploit them.
Our data
Theme #3: Newer technologies, new
To provide a broad perspective on the nature avenues of attack
of the attack surface, the report draws on As new technologies are introduced into
data from HPE security teams, open source the computing ecosystem, they bring with
intelligence, ReversingLabs, and Sonatype. them new attack surfaces and security
challenges. This past year saw a rise in the
already prevalent mobile-malware arena.
Key themes Even though the first malware for mobile
devices was discovered a decade ago, 2014
Theme #1: Well-known attacks still was the year when mobile malware stopped
commonplace being considered just a novelty. Connecting
Based on our research into exploit trends existing technologies to the Internet also
in 2014, attackers continue to leverage brings with it a new set of exposures.
well-known techniques to successfully Point-of-sale (POS) systems were a primary
compromise systems and networks. Many target of multiple pieces of malware in 2014.
vulnerabilities exploited in 2014 took As physical devices become connected
advantage of code written many years through the Internet of Things (IoT), the
ago—some are even decades old. diverse nature of these technologies gives
Adversaries continue to leverage these rise to concerns regarding security, and
classic avenues for attack. Exploitation of privacy in particular. To help protect against
widely deployed client-side and server-side new avenues of attack, enterprises should
applications are still commonplace. These understand and know how to mitigate the
attacks are even more prevalent in poorly risk being introduced to a network prior to
coded middleware applications, such as the adoption of new technologies.
software as a service (SaaS). While newer
Theme #4: Gains by defects, bugs, and logic flaws. Security
determined adversaries professionals have discovered that most
Attackers use both old and new vulnerabilities stem from a relatively small
vulnerabilities to penetrate all traditional number of common software programming
levels of defenses. They maintain access to errors. Much has been written to guide
victim systems by choosing attack tools that software developers on how to integrate
will not show on the radar of anti-malware secure coding best practices into their
and other technologies. In some cases, daily development work. Despite all of this
these attacks are perpetrated by actors knowledge, we continue to see old and new
representing nation-states, or are at least vulnerabilities in software that attackers
in support of nation-states. In addition to swiftly exploit. It may be challenging,
the countries traditionally associated with but it is long past the time that software
this type of activity, newer actors such as development should be synonymous with
North Korea were visible in 2014. Network secure software development. While it may
defenders should understand how events on never be possible to eliminate all code
the global stage impact the risk to systems defects, a properly implemented secure
and networks. development process can lessen the impact
and frequency of such bugs.
Theme #5: Cyber-security legislation on
the horizon Theme #7: Complementary
Activity in both European and U.S. courts protection technologies
linked information security and data privacy In May 2014, Symantec’s senior vice president
more closely than ever. As legislative and Brian Dye declared antivirus dead1 and the
regulatory bodies consider how to raise industry responded with a resounding “no,
the general level of security in the public it is not.” Both are right. Mr. Dye’s point is
and private spheres, the avalanche of that AV only catches 45 percent of cyber-
reported retail breaches in 2014 spurred attacks2—a truly abysmal rate. In our review
increased concern over how individuals and of the 2014 threat landscape, we find that
corporations are affected once private data enterprises most successful in securing
is exfiltrated and misused. The high-profile their environment employ complementary
Target and Sony compromises bookended protection technologies. These technologies
those conversations during the period of work best when paired with a mentality
this report. Companies should be aware that assumes a breach will occur instead
new legislation and regulation will impact of only working to prevent intrusions and
how they monitor their assets and report on compromise. By using all tools available and
potential incidents. not relying on a single product or service,
defenders place themselves in a better
Theme #6: The challenge of position to prevent, detect, and recover
1 online.wsj.com/news/article_email/SB1000142405270 secure coding from attacks.
23034171045795421402358
50578-lMyQjAxMTA0MDAwNTEwNDUyWj. The primary causes of commonly exploited
securitywatch.pcmag.com/security/323419-
2 software vulnerabilities are consistently
symantec-says-antivirus-is-dead-world-rolls-eyes.
The security what might lie ahead in 2015, assuming that
what is rising will continue to rise and what is

conversation
falling will continue to fall.

Our analysis indicated that breaches and


Reflecting on the 2014 threat landscape we malware were weighing heavily on our minds
undertook a broad top-level look at public in 2014. “Malware” itself was the top key word
security research and analysis published of 2014 (and of 2013), outstripping even
in 2014, using key word analytics targeting “security” as a favored key word and making
specific concepts. bold progress among security practitioners
as part of the key phrase “malware
As befitting a look at high-profile trends, family.” Key phrase analysis indicated
our data was drawn strictly from sources that conversation about mobile malware,
“Malware” was the top key available on the public Internet. The first set particularly Android malware, was rising even
word of 2014, outstripping even of data was drawn from the press covering as the more neutral phrase “mobile devices”
“security” as a favored key word the industry as well as other sources. We fell. The efficacy of anti-malware software
drew the second set from content presented was debated in 2014, but the analysis
at industry conferences such as BlackHat, indicates that malware as a hot topic isn’t
DefCon, and Virus Bulletin. The yearly going anywhere anytime soon.
Cyber Risk Report is time-bound and so we
resolved to do a time-oriented analysis. Digging a bit deeper, we returned to our lists
of key words and key phrases and asked who
Working within that dataset, we analyzed “won” 2014—the good guys, the bad guys,
two sets of terms for their frequency of or no one in particular. At this point human
appearance. The first set, the key words, are intervention was necessary, and we hand-
the security-associated words more familiar sorted terms into categories of “good guys,”
to a general audience; for instance, attack, “bad guys,” and “neutral” in order to perform
threat, or targeted. These terms are also categorical analysis as to whether attackers
more likely to appeal to headline writers, or defenders were better represented over
because what they lack in specificity they the course of the year.
make up for in brevity and “oomph.” The
second set, the key phrases, describe more We found that security experts’ view of the
granular and complex concepts that tend world may in fact be a bit dimmer than that
to be used mainly by security practitioners. of the general public. Though the public (as
Exploit kit and C&C server are two examples seen through our key words) was concerned
of key phrases. This distinction allowed us about things such as malware (#1 on their
to approach the data in a progression from list), attacks (#3), and exploits (#5), by and
less to more specificity. Between the two, large consumers seemed to use fairly neutral
we started our analysis with approximately terms when diving into security-related
10,000 words and phrases we found to be topics online.
of interest.
The pros, on the other hand, are a skeptical
Our first dive, “total 2014+2013,” looked at lot. We classified nearly half of the most
which topics rose and fell in the English- popular key phrases as negative in tone. The
language trade press over the last 24 value-neutral “operating system” led the
months. If we assume that trade journalism is pack, but after that the misery began with
a good mirror of what’s actually happening in “targeted attacks” (#2), “exploit kit” (#3),
the real security world, it should follow that “social engineering” (#5), and “C&C server”
the frequency of key words and key phrases (#6) and continued from there. Interestingly,
in the press is a good indicator of what those the key phrase “security researchers” nearly
in the industry are thinking about. doubled in usage between 2013 and 2014,
while the more familiar term key word
One of the strengths of Big Data is its “hackers” turned in steady usage numbers
predictive power. From our 2013+2014 and barely outperformed the longer phrase.
results, we made linear extrapolations to see
Of course, one can always argue that the Despite the strong showing of malware and
bad guys get more attention because related terms, we found that the Internet as a
they are bad, and that it is merely human whole took more interest in specific breaches
nature to take an interest in things that than in specific vulnerabilities. Heartbleed,
might be harmful. But, we asked ourselves, the most-referenced vulnerability of the
do people actually learn anything from year by several orders of magnitude, barely
all the excitement? Once again we turned garnered the level of interest attracted by a
to our data, asking which breaches and moderately attention-getting breach such
vulnerabilities caused the most excitement as that of JPMorgan Chase, and nothing like
in 2014. that of a Home Depot or a Target. In turn,
Target at its most interesting was put in the
We saw human nature at work—particularly shade by the celebrity-photo story. We did
the parts of human nature easily bored when note that the photo story caused interest in
the same thing (or nearly the same thing) celebrity photos themselves to spike, causing
happens repeatedly, as well as the parts references to such things to spike by about
that like looking at unclothed people. Our a third.
comparison of four high-profile breaches
(Target, Home Depot, Goodwill, and the What can security practitioners learn from
theft of certain celebrity photos from Apple’s this exercise? Where might one go with a Big
iCloud service) indicated that the photo Data-fueled analysis of security trends? One
scandal utterly dwarfed the others in public obvious path would be to deep-dive in tech-
interest. More interestingly, of the other three support threads and other venues where
breaches, Target (chronologically the first bugs are described, in search of reports that
of the four) garnered the most attention, are not just bugs but probable security holes.
even though each of the remaining two At the moment, such forums can be useful
were similar in either size (Home Depot) or reading to canny researchers, but the signal-
demographic (Goodwill). Discussion of Target to-noise ratio is poor; introducing efficiencies
during the 2014 holiday season—a full year into sifting that data could be fruitful and
after the initial attack—far outstripped might help companies with popular software
that of the other breaches. We expected to to spot potential trouble before it spots
see that Target had raised consciousness them. Taking a more proactive tack, robust
about breaches; instead, a sort of burnout data analysis is already a powerful tool in the
appeared to take place, with press paying hunt to sift actual attacks from the avalanche
less attention to subsequent events but of noise the average network’s parameter
looping back near the anniversary of the defense “hear” every day. As the security
original breach to reflect. industry waits for automated security data
exchange platforms to truly come to life, data
[Editors’ note: As noted, our data was analysis can provide us what those not-yet-
gathered and analyzed during the first viable systems cannot.
eleven months of 2014. Ironically, at the time
we were putting the Report together for On the other end of the complexity
publication, the Sony breach dominated not spectrum, as we considered the possibilities
only tech but entertainment and political for this Risk Report, one of our colleagues
headlines. We have no doubt that with all noted with disgust that some journalists
that going on it would have posted some seem to treat Google’s search-autocomplete
impressive numbers, but we concluded that function as some sort of Big Data-driven
far too much was in motion to provide a fair hivemind oracle. However, what makes for
assessment of its impact for this Report.] lazy journalism can provide an excellent
reminder of the foundational questions at
the base of security practitioners’ work:
Indeed. As we present our analyses of the Justice Department charged five officers in
threat landscape throughout this Report, we Unit 61398 of the Third Department of the
are reminded that what we examine, decide, Chinese People’s Liberation Army (PLA) with
and do is important. And a management hacking into U.S. entities for the purpose
problem. And, truly, so important. of intellectual property theft.10 In October,
Novetta published reports on a cyber-
espionage interdiction operation (referred

Threat actors
to as Operation SMN), in which Novetta
worked with U.S. security partners to take
down 43,000 installations of tools used by a
2014 saw a shift in how technology was group called Axiom. It identified similarities
used in local and regional uprisings. in attacks seen as far back as Operation
Though hacktivism can be said to have Aurora that could be attributed to this group.
declined—prompted by a decrease in Evidence suggests that this group targeted
anonymous activity following several high- organizations in China in addition to those in
profile arrests3—we saw an increase in the the West.11
malicious use of technology both in and
against protests. Attackers, reportedly from International law enforcement agencies
China, used remote access Trojans (RATs) increasingly worked together as well. In
masquerading as custom Android apps May Europol and the FBI conducted raids
against protesters in Hong Kong.4 Attackers targeting users of the Blackshades RAT.12
also reportedly intercepted Apple iCloud 13
The same month, an international effort
traffic to collect usernames and passwords. 5 identified the leader of a group responsible
Elsewhere, the TOR network was hacked for the notorious Gameover Zeus botnet and
by unknown entities and its users were CryptoLocker, leading to the dismantling
identified.6 As we closed the editing cycle for of those networks.14 In November, agencies
this Report, a massive data breach involving from 16 European countries, along with
Sony Pictures Entertainment captivated representatives from the United States, took
world attention, though the provenance of down over 400 hidden services on the dark
that attack was unclear at press time.7 Web, including many carding and illegal
drug markets.15
Attacks originating from groups based in
China continued to target Western interests.
Although historically these groups have Nation-state
focused on intellectual property theft, we supported activity
observed a change in targets this year to
focus on identity information as well. One In 2014, we examined the state-sponsored
high-profile example involved Community or state-condoned cyber activity of actors
3
wired.com/2014/06/anonymous-sabu/.
Health Systems, which disclosed a breach in nations including Iran and North Korea.
4
lacoon.com/chinese-government-targets-hong-
kong-protesters-android-mrat-spyware/. allegedly by a China-based group known as Among those nations we found three
5
zh.greatfire.org/blog/2014/oct/china- APT 18. In that breach, the Social Security different levels of state involvement in cyber
collecting-apple-icloud-data-attack-
coincides-launch-new-iphone.
numbers and other personal information of activity: indirect operational involvement,
6
blog.torproject.org/blog/tor-security-advisory-
4.5 million patients was compromised.8 This direct operational involvement, and
relay-early-traffic-confirmation-attack. was the largest loss of patient data since condoning with plausible deniability of
7
nbcnews.com/storyline/sony-hack/north-korea- the U.S. Department of Health and Human operational involvement. The degree of
behind-sony-hack-if-so-it-had-help-n271341.
Services began keeping records of breaches apparent state involvement was derived
8
reuters.com/article/2014/08/18/us-community-
health-cybersecurity-idUSKBN0GI16N20140818. in 2009.8 Adversaries acted quickly when based on several factors, including:
9
rsaconference.com/events/us14/agenda/ observed: Mandiant reported that APT1,
sessions/1342/state-of-the-hack-one-
on which it had published an initial report • Evidence of state sponsorship of
year-after-the-apt1-report.
one year before, immediately abandoned actor training
10 
justice.gov/opa/pr/us-charges-five-
chinese-military-hackers-cyber-espionage- the command-and-control (C2) structure • The nation’s cyber warfare infrastructure,
against-us-corporations-and-lab.
described in that report and set up a capabilities, or doctrine
11 
novetta.com/files/9714/1446/8199/
Executive_Summary-Final_1.pdf. new one.9
12 
europol.europa.eu/content/worldwide-
• The nation’s cyber laws
operation-against-cybercriminals.
2014 saw an increased response to this • Threat actor group ties to government or
fbi.gov/news/stories/2014/may/international-
type of attacker group. In May 2014 the U.S.
13 

blackshades-malware-takedown/international- military entities


blackshades-malware-takedown.
14 
fbi.gov/news/stories/2014/june/
gameover-zeus-botnet-disrupted.
15 
europol.europa.eu/content/global-action-
against-dark-markets-tor-network.
Iran • IT center.23
In HPE Security Briefing Episode 11,16 we
• According to the Iranian Republic
presented our findings on threat actors
News Agency, Ashiyane’s leader,
Iran operating within the Islamic Republic of Iran.
Behrouz Kamalian,
Iran’s cyber doctrine pivots on the belief that
“The cyber arena is actually the arena of the • ordered the group to work for the
Hidden Imam”17 and relies heavily on warfare Iranian government by attacking foreign
tactics.18 In November of 2010, Iran’s Passive government and media websites.24
Civil Defense Organization announced a
• Behrouz Kamalian’s father, Hossein
plan to recruit hackers for a “soft war” in
Kamalian, has served as the Iranian
cyberspace.19 On February 12, 2014, the
ambassador to Thailand, Laos, Myanmar,
Ayatollah Ali Khamenei delivered a message
Bahrain, France, and Yemen.
to the Islamic Association of Independent
University Students, instructing them to • The European Union exposed Behrouz
prepare for cyber war: Kamalian’s involvement in human rights
violations—namely his involvement
“You are the cyber-war agents and such a assisting the regime with cracking down on
war requires Ammar-like insight and Malik protesters during the 2009 political unrest
Ashtar-like resistance; get yourselves ready in Iran.25
for such war wholeheartedly.”
• The EU report also linked Ashiyane to Iran’s
The Ayatollah stressed that this was the Revolutionary Guard.26
students’ religious and nationalistic duty.20 • A report from Israel’s Institute for
As noted in the report, Iran’s cyber landscape Counterterrorism notes that it has been
has changed significantly from 2010 to the alleged that Ashiyane is responsible for
present. There was a noticeable transition training Iran’s Cyber Army (ICR).27
from Iran’s increasing awareness of cyber
intrusions to the regime’s institution of • Despite Iran’s strict laws regulating Internet
defensive cyber capabilities. The focus then access and content, Ashiyane members
shifted to implementing strategic offensive do not fear being held accountable for
cyber capabilities. From the discovery of their actions.28
Stuxnet to the creation of a vast cyber army, • Some of the threat actor groups profiled
Iran has made significant developments in in the report use gamification as a
the cyber war arena in a relatively training mechanism, including capture
short time.21 the flag (CTF) contests sponsored by
Sharif University29 and the Atomic Energy
Our security research uncovered the Organization of Iran (AEOI). 30
16 
h30499.www3.hp.com/t5/HP-Security-Research-Blog/HPSR- following factors implying Iran’s indirect
Threat-Intelligence-Briefing-Episode-11/ba-p/6385243.
operational involvement in the activities of It is interesting to note that HPSR Security
17
memri.org/report/en/print7371.htm.
the Iranian cyber underground: Briefing Episode 11 had a significant impact
18 
inss.org.il/index.aspx?id=4538&articleid=5203.
19 
forbes.com/sites/jeffreycarr/2011/01/12/irans- • Threat actor group Shabgard’s training on some of the threat actors profiled in the
paramilitary-militia-is-recruiting-hackers/.
portal at Webamooz.ir offered accredited report. After nearly 11 years of activity, the
20 
haaretz.com/mobile/1.574043.
IT training in conjunction with Shahid website and forums for Shabgard are
21 
h30499.www3.hp.com/hpeb/attachments/hpeb/off-by-on-
Beheshti University.22 now defunct. 31
software-security-blog/177/1/Companion%20to%20HPSR%20
Threat%20Intelligence%20Briefing%20Episode%2011%20Final.pdf.
22 
webamooz.ir/home/%D9%85%D8%AF%D8
• Threat actor group Ashiyane offered
%B1%D8%B3%DB%8C%D9%86-2/. training in conjunction with the
23 
h30499.www3.hp.com/hpeb/attachments/hpeb/off-by-on- Sharif University
software-security-blog/177/1/Companion%20to%20HPSR%20
Threat%20Intelligence%20Briefing%20Episode%2011%20Final.pdf.
24 
defenddemocracy.org/behrouz-kamalian.
25 
jpost.com/International/EU-to-discuss-sanctions-
against-over-80-Iranian-officials.
26 
eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri
=CONSLEG:2011D0235:20130312:EN:PDF.
27 
ict.org.il/LinkClick.aspx?fileticket=p02YcWmn_94%3D&tabid=492.
28 
h30499.www3.hp.com/hpeb/attachments/hpeb/off-by-on-
software-security-blog/177/1/Companion%20to%20HPSR%20
Threat%20Intelligence%20Briefing%20Episode%2011%20Final.pdf.
29 
irancybernews.org/2013/10/sharif-university-
ctf-online-qualifier.html.
30
ctf.aeoi.org.ir.
31
shabgard.org.
North Korea • North Korea’s outward-facing Internet
In HPE Security Briefing Episode 16, 32 we connection is only available to select
focused on the enigma that is North Korea’s individuals, and is closely monitored for any
cyber threat landscape. North Korea’s activity that is deemed anti-regime.
North cyber warfare doctrine has not been clearly
Korea • The North Korean regime strictly controls
stated. However, based on cultural and
all Internet infrastructure, 38 meaning cyber
technical observations, we may deduce
activity by dissidents or autonomous
that North Korea’s cyber doctrine follows
hacker groups is very unlikely.
the tenets of juche nationalism and the
songun doctrine. North Korea considers • The fact that North Korea reportedly
its cyber warfare capabilities an important spends so much of its limited resources
asymmetric asset in the face of its perceived on training and equipping cyber operators
enemies. 33 In November 2013, Kim Jong Un implies the regime is investing in a key
referred to cyber warfare capabilities as a military asset.
“magic weapon” in conjunction with nuclear
weapons and missiles. 34 Additionally, we discovered that much of
the computer network operations (CNO)
The North Korean regime plays a direct role conducted on behalf of the regime originates
in training its cyber warfare operators via from the networks of third parties such
primary and secondary education and the as China, the United States, South Asia,
university system. 35 Successful students in Europe, and even South Korea. 39 When these
the cyber warrior track often attend Kim networks are used to launch CNO on behalf
Il-sung University, Kim Chaek University of of North Korea, attribution is difficult.
Technology, 36 or the Command Automation
University. Some students attend a two-year The Sony attack in late November was, at
accelerated university program, then study press time, not firmly linked to North Korea.
abroad before they are assigned to a Despite the fact that the regime denies
cyber-operator role. 37 responsibility for the attacks,40 several
factors seem to support that North Korea
Our research led to the conclusion that played a role in them. However, based on
any activity originating from North Korea’s our previous research of North Korean cyber
IP space is a product of the state’s direct capabilities, it is difficult to discern whether
operational involvement for the fol the regime acted alone. It is plausible as of
lowing reasons: press time that the actors responsible for this
attack relied on the assistance of an insider.
• North Korea’s cyber infrastructure is
divided into two major parts: an
outward-facing Internet connection and
a regime-controlled intranet.

h30499.www3.hp.com/t5/HP-Security-Research-
32 

Blog/HP-Security-Briefing-episode-16-Profiling-
an-enigma-North-Korea/ba-p/6588592.
h30499.www3.hp.com/hpeb/attachments/hpeb/
33 

off-by-on-software-security-blog/388/2/HPSR%20
SecurityBriefing_Episode16_NorthKorea.pdf.
english.chosun.com/site/data/html_
34 

dir/2013/11/05/2013110501790.html.
aljazeera.com/indepth/featur
35 

es/2011/06/201162081543573839.html.
aljazeera.com/indepth/featur
36 

es/2011/06/201162081543573839.html.
aljazeera.com/indepth/featur
37 

es/2011/06/201162081543573839.html.
defense.gov/pubs/North_Korea_Military_
38 

Power_Report_2013-2014.pdf.
csmonitor.com/World/Security-Watch/2013/1019/
39 

In-cyberarms-race-North-Korea-emerging-
as-a-power-not-a-pushover/(page)/5.
voanews.com/content/exclusive-north-
40 

korea-denies-involvement-in-cyber-
attack-sony-pictures/2545372.html.
Notes on the threat modeling process to happen to them. Outcomes are usually
In May’s HPE Security Briefing Episode 13— oriented toward appropriate controls and
the first after the name of the series changed budget priorities. This kind of modeling is an
from the earlier “Threat Briefing,” to reflect effective way to approach highly regulated
HPSR’s growing scope of inquiry – we took data or industries.
a step back from the work of doing threat
modeling and looked at the history and Attacker-centric threat modeling draws on
theories of the practice.41 experiences and theories about attacks on
infrastructure, or against certain types of
At its base, threat modeling is yet another data or entities.47 Its goal is to predict how
permutation of risk management, the soul of anticipated attacks might progress, and
information security.42 Threat modeling asks how to deal with them if they do. This type
that we assign value to our assets, examine of model may be appropriate when assets
them closely for potential vulnerabilities, are less important than the motivation of
assess what risks those vulnerabilities pose adversaries towards an organization or state,
to our enterprise, and plan to mitigate them or when a pattern of intrusions is repeated
(or not). Threat modeling is not auditing— against multiple targets.
though auditing can be useful as we
determine which assets or controls merit the The analyses we do as we examine
modeling effort—but a way of learning from nation-state activity draw on multiple forms
the past to manage future risk. Above all, of information-gathering, including work
threat modeling is, as most things are in the done in partnership with HPE’s Digital
enterprise, a method of resource allocation.43 Investigation Services group and, when
appropriate, independent third-party
There are three main approaches to threat researchers and even competitors in the
modeling: software-centric, asset-centric, information-security field. The growing
and attacker-centric. Software-centric threat acceptance of prudent information-sharing
modeling looks at how applications are built is both a response to current conditions in
and how data flows through them. It tries to the world and a hopeful sign that concerned
catch bad behaviors during the design and enterprises and other entities can find a
implementation stages—that is, before the productive and effective balance between
application is released. Software vendors that healthy competition and the workings of a
follow a Software Development Lifecycle44 healthy Internet.
process, or SDL, usually have multiple
checkpoints to catch as many potential We should note, by the way, that not all
issues as possible. Such modeling doesn’t threat models attempt to identify who an
catch every problem, but it cuts down on the attacker might be. Some models care
“low-hanging fruit” and makes it obvious to about attribution, and some do not. All
developers where problems may lie.45 attacker-centric models, however, try to
map controls to each phase of an attack.48
Asset-centric threat modeling looks at what This details the actions or tools that might
has value to an organization, or to its people be appropriate at each stage of the conflict.
or processes. Those valuations are a guide to Understanding how individual attacks fit
h30499.www3.hp.com/t5/HP-Security-Research-
41 

Blog/HP-Security-Briefing-episode-13-The-art-and- appropriate protections.46 The process often into the chosen schema can help enterprises
near-science-of/ba-p/6493964#.VR2EofnF8nM includes a look at what could happen to prioritize spending and deployment
ssd.eff.org/en/module/introduction-threat-modeling
42 
the assets, and the effect if something were of resources.
Chen, Yue. “Software Security Economics
43 

and Threat Modeling Based on Attack Path


Analysis; A Stakeholder Value Driven Approach”
Retrieved from sunset.usc.edu/csse/TECHRPTS/
PhD_Dissertations/files/ChenY_Dissertation.pdf
44 
microsoft.com/en-us/SDL/about/benefits.aspx
Jangam, Ebenezer. “Threat Modeling and
45 

Its Usage in Mitigating Security Threats in


an Application.” Retrieved from isea.nitk.
ac.in/publications/ThreatModeling.pdf
Kayem, Anne. “Attack Centric Threat Modelling
46 

Approach to Social Networks: Hacking and


Counter Measures.” Retrieved from people.cs.uct.
ac.za/~rratshidaho/Project/documents/Lit_Maoyi.pdf
noord-group.com/process-attack-simulation-and-
47 

threat-analysis-pasta-risk-centric-threat-modeling
48
Ramkumar Chinchani, Anusha Iyer, Hung Ngo, and
Shambhu Upadhyaya. “A Target-Centric Formal
Model For Insider Threat and More” Retrieved
from cse.buffalo.edu/tech-reports/2004-16.pdf
The cyber underground Conclusion
Activity in the cyber underground primarily There’s the Internet that we see and the
consists of cyber crime involving identity Internet that most of us don’t, and even
theft and other crimes that can be easily though it is mostly invisible, the darker side
monetized. There have been other of the Internet is pervasive and influential.
motivations observed though, as was the Our investigations certainly suggest that the
case in August when suspected Russian machinations and maneuvers of criminals
hackers stole gigabytes of customer data and state-sponsored cyber operators in
from U.S.-based JPMorgan Chase during the cyber underground have significant
a period of escalated tension between and lasting effects on the security of the
Russia and the United States, in which greater Internet and society at large. Looking
Russia was amassing troops on the border into nation-state-sponsored cyber activity
Recent credit-card information
with Ukraine and the United States had highlights the many levels at which cyber
breaches occurred in point-of-
imposed economic sanctions against Russia operations and state -sanctioned activity
sale (POS) systems used by
in response. Reports stated that the FBI can occur, and how malware and the tools
retailers, which proved to be
believed the attackers to be and techniques of cyber criminals can be
a target-rich environment for
state-sponsored.49 utilized in different ways to accomplish
many attackers.
different goals. (The same techniques nation
In September, F-Secure published research states might use to stifle protest or target
on “Quedagh,” a Russian cyber crime opposing state interests can just as easily be
organization, and its use of BlackEnergy used by criminals to perpetrate fraud or steal
malware to target Ukranian government intellectual property.)
organizations to steal information. 50 In its
research it found evidence to suggest that Of most concern to enterprises, intellectual
this group could have been operating property continues to be targeted. 53 In 2014,
during the 2008 Russo-Georgian war, in responses to this long-recognized threat,
which cyber operations paralleled and international cooperation to address
military offensives. these attacks, improved and continued to
gain momentum. Cyber crime comes in
In October, FireEye published research many flavors but it remains vastly driven by
showing likely Russian state sponsorship of financial interests. We expect attackers to
attacks targeting various organizations, with continue to focus on intellectual property,
a focus on Georgia and the Caucasus, and identity data, and card information. While
primarily using spear-phishing techniques systems such as “chip and pin” are likely to
with embedded malware. 51 The research prove more resistant to breach as particular
indicated that this group may have been points in financial processes get hardened,
acting as far back as 2004. other points become more attractive to
attackers. In a similar vein, as technology
However, one of the biggest stories this develops to improve the security of systems,
year was the ongoing spate of credit-card it also conversely develops to make particular
information breaches targeting U.S. retailers, targets increasingly accessible. We expect
including Staples, Kmart, Dairy Queen, Jimmy escalations in this area to continue.
John’s, Home Depot, PF Chang’s, Goodwill,
Sally Beauty Supply, Michaels, and Neiman
Marcus. This followed the major Target
breach during the 2013 holiday season.
Many of the cards stolen from these stores
ended up on carding forums being sold in
groups by Russian actors. 52 These breaches
occurred in point-of-sale (POS) systems
used by retailers, which proved to be a
49
b loomberg.com/news/2014-08-28/russian-hackers- target-rich environment for many attackers.
said-to-loot-gigabytes-of-big-bank-data.html.
More detailed discussion is found
50
f -secure.com/documents/996508/1030745/
blackenergy_whitepaper.pdf. later in this report.
51
f ireeye.com/blog/technical/2014/10/apt28-a-window-
into-russias-cyber-espionage-operations.html.
52
k rebsonsecurity.com/2013/12/whos-
selling-credit-cards-from-target/.
53
ipcommission.org/report/ip_
commission_report_052213.pdf.
Vulnerabilities Exposing weaknesses in OpenSSL
Watching the industry respond to the

and exploits
Heartbleed vulnerability highlighted
how unprepared we were for this type
of disclosure. The flaw allowed for an
In the past year, significant shifts occurred unauthenticated remote attacker to
in how researchers go about finding disclose the memory of an application that
weaknesses in an enterprise’s attack uses the vulnerable version of OpenSSL.
surface. The hunt is on for vulnerabilities Successful attacks could result in the
in foundational technologies on which disclosure of SSL private keys, username/
corporations rely to provide core business password combinations, and session tokens.
functionality. Multiple times in the last year, Exploitation of this flaw typically would not
high-profile vulnerabilities were discovered leave any signs of abnormal behavior in the
that left enterprises scrambling to application’s logs. It was a silent but
deploy patches and clean up serious threat to secure communication
compromised machines. on the Internet.

Even with this shift in focus, our adversaries This vulnerability also changed how
are still leveraging classic avenues for attack. the industry responded to vulnerability
Exploitation of widely deployed client- disclosures. Due to the severity and active
side and server-side applications are still exploitation of the vulnerability, corporations
commonplace. Browser-based use-after-free were forced to respond quickly, patching
(UAF) vulnerabilities are the vector of choice servers that were not routinely patched. The
when attacking enterprises and government issue existed in an application library that
agencies. Corporations are also unaware of did not have a clear update path. Enterprises
the risk imposed on them by using poorly did not have a solid understanding of which
coded middleware applications. Trends in applications were using this library and
submissions to the HPE Zero Day Initiative where it was located inside their networks.
highlight the dynamic nature of the attack Large software companies such as Microsoft
surfaces to which enterprises are exposed have patching schedules so IT staff (users)
on a daily basis. Having insight into these can plan for the rollout of an update. In this
trends will help users better prepare for the case, network administrators were left to
evolving nature of threats. hunt all applications using the vulnerable
version of the library and then manually
apply the patch. Many organizations could
not deploy the patches fast enough
and struggled to defend against
incoming attacks.
This activity rekindled the conversation is also responsible for introducing the
around the security offered by open-source Heartbleed vulnerability. Seggelmann is not
projects and the lack of financial support completely to blame, of course. OpenSSL is
provided to the projects used in critical an open source project. The “many eyes” that
infrastructure. Many entities that rely heavily look at this code failed to catch this bug prior
on OpenSSL to work correctly began to 2014, but a new breed of individuals are
donating financial support to the project. looking at this code. This code is now
Meanwhile, researchers were upping their known for having vulnerabilities and
efforts to review OpenSSL source code white-hat researchers are now focusing
to find additional vulnerabilities. It didn’t their efforts on auditing and securing this
take long for another critical OpenSSL critical infrastructure.
vulnerability to show up in the queues at the
Zero Day Initiative. Jüri Aedla is credited for Value of information disclosure
the original discovery of this vulnerability. Discovery of information disclosure
vulnerabilities such as Heartbleed is highly
The issue exists wholly within ssl/d1_both.c valued by the exploitation community. These
and occurs when handling Datagram issues can also be used in conjunction with
Transport Layer Security (DTLS) fragments. remote code execution vulnerabilities to
DTLS has a fragmentation mechanism to bypass modern exploit mitigations. For
break up large messages for UDP. Each example, Microsoft® Internet Explorer®
fragment contains a 3-byte length field, relies heavily on a mitigation technology
which should be the same for all fragments called Address Space Layout Randomization
in a message. OpenSSL incorrectly assumes (ASLR) to increase the complexity of
that all DTLS fragments specify the same exploitation of a vulnerability existing in
message size. Specifically, it trusts that the the browser.
message length specified within the header
of the first fragment will be invariant across ASLR randomizes the base address of
all fragments. loaded DLLs. In the past, attackers relied on
known addresses in DLLs to craft exploits.
Another significant observation is that the With the introduction of ASLR, attackers
Wireshark protocol decoder highlights the must either find a way to load a non-
mismatch of the length values in the DTLS ASLR’d DLL or try to leak a DLL address.
fragments as a protocol error. Unfortunately, Using information disclosure vulnerabilities,
OpenSSL did not recognize this as an attackers can render this mitigation useless
error condition. by cherry-picking pointers within the leaked
data, allowing them to learn the base address
Just sending this single UDP packet results of the randomized DLLs.
in the application segfaulting and causing
a denial-of-service condition, but more Heartbleed was a nice demonstration of a
malicious actions are possible. An attacker highly controllable information disclosure
could leverage this issue to corrupt adjacent vulnerability due to a buffer over-read, but
metadata, and possibly execute code in the these types of issues can also occur due to
context of the process using OpenSSL. race conditions in an application. In April,
the HPE Zero Day Initiative received an
The OpenSSL code does some sanity interesting vulnerability in Apache httpd
checking on the length fields in the DTLS mod_status from several Polish researchers.
fragments but, unfortunately, the check The root cause of the vulnerability was a
occurs too late and could be bypassed. The race condition between the updating of
developers even left a prophetic comment httpd’s “scoreboard” and mod_status, leading
in the code about what would happen if the to a heap overflow with attacker-supplied
validation failed. data. ZDI concluded it was possible, with a
well-crafted exploit, to disclose application
This vulnerability is interesting from a memory containing internal server
development perspective. According to the configuration details, htaccess credentials,
commit logs, Robin Seggelmann introduced and other application data.
this vulnerability into the OpenSSL code
base four years ago. Robin Seggelmann
Weaknesses in enterprise of data handled by the OpUtils software.
Many corporations are unaware According to ManageEngine, OpUtils helps
of the risk imposed on them by
middleware network engineers manage their switches
using poorly coded middleware and IP address space. 55 Specifically, OpUtils
Corporations are embracing software as
and IT management applications. would have details about a corporation’s IPv4
a service (SaaS) and other middleware
and IPv6 subnets, backups of configuration
solutions to shorten the time it takes
files of Cisco routers and switches, and
to deliver business applications. These
bandwidth usage statistics. It’s possible for
applications contain copious amounts of
an attacker to leverage the vulnerability
sensitive corporate data and personally
to disclose this valuable information to aid
identifiable information. Middleware
them in future attacks. Many corporations
applications rely heavily on protocols such
are unaware of the risk imposed on them
as HTTP, Simple Object Access Protocol
by using poorly coded middleware and IT
(SOAP), and JSON to communicate with
management applications. Updates to these
each other. Most of these communication
applications should be applied as soon as
protocols are exposed to the network and
they are available to reduce exposure.
are accessible without authentication. The
attack surface exposed by these applications
can be large and riddled with weaknesses. Vulnerability and
These services have become an increasingly exploits trends in 2014
popular target for researchers and the (Windows case)
number of vulnerabilities discovered in
2014 was astonishing. The HPE Zero Day 2014 saw Microsoft Internet Explorer,
Initiative worked with numerous middleware Microsoft Office and Adobe® Flash Player
and IT management software vendors to zero days in the wild. Notably in 2014
shore up their code. In fact, during just one there were no major Oracle Java zero days
week, a single researcher submitted over discovered exploited in the wild. This is likely
40 remotely exploitable vulnerabilities due in part to the click-to-play feature Oracle
in ManageEngine’s product line. These recently introduced. This section takes a
vulnerabilities ranged from information deeper look at the security technologies and
disclosure issues to denial of service how they were bypassed.
conditions and remote code
execution vulnerabilities. Defeating ASLR and DEP security
protections
To highlight the ease with which these Most of the exploits observed in the wild
issues could be exploited, this Report were successful at defeating ALSR and
takes a deeper look at one of the resolved Data Execution Prevention (DEP). DEP,
information disclosure issues. CVE-2014- like ASLR, is a security feature. It marks
8678 (ZDI-14-38654) was a vulnerability in the areas of memory as either “executable” or
ManageEngine OpUtils ConfigSaveServlet “nonexecutable,” allowing only data in an
servlet. This vulnerability allowed remote executable area to be run. DEP protects
attackers to disclose files on vulnerable against some program errors and helps
installations of ManageEngine OpUtils. prevent certain malicious exploits. The ability
Authentication was not required to exploit to bypass these protections has become a
this vulnerability. common feature of modern exploits. While
many different techniques may be used to
The issue lies in the failure to properly defeat these protections, the most popular
sanitize the saveFile parameter for directory method is to corrupt application objects on
traversal characters. A remote attacker can the heap and change the length field of the
exploit this vulnerability to disclose files from object, as seen in the multitude of Microsoft
the system. Internet Explorer UAF exploits. Often surgical
precision memory manipulation is performed
Using directory traversal, an attacker can resulting in a very high exploit success rate.
easily disclose sensitive information residing Object corruption and code reuse attacks are
on the server running ManageEngine typical techniques currently used to defeat
OpUtils. The impact of this attack can be ASLR and DEP.
visualized further by understanding the type
54
zerodayinitiative.com/advisories/ZDI-14-386/.
55
manageengine.com/products/oputils/ Page 15.
Object corruption The function calls other functions that in
For example, the CVE-2014-1761 exploit in turn call VirtualProtect to add an executable
the wild corrupted an object created from bit to the designated memory region. This is
GFX.dll. The method corrupted is related to a a very sophisticated way of defeating DEP—
graphical object and is called constantly with not exactly return-oriented programming
a short interval of time between each call. (ROP), but a type of code-reuse attack.
This allows the attacker’s code to execute
immediately following the corruption of the It is possible to use ROP to defeat DEP and
vtable of the object. is the more traditional approach. CVE-2014-
1776 exploit code used ROP; after first
Another example exploit used CVE- acquiring read and write access to the full
2014-0515 and involved corrupting process memory area, it sets up the ROP
multiple objects, including the vector code. When the ROP code is running, it adds
object and FileReference object. Vector an executable bit to the shellcode area that
object exploitation uses a buffer overflow follows the ROP code.
vulnerability resulting in an abnormally large
field value length. This allows the attacker to Rise of legacy code vulnerabilities
access a vast range of memory freely from Deprecated features
the script. Vulnerabilities found in legacy code were
also a significant factor in 2014. CVE-2014-
Some IE exploits also used a similar 0515 was a vulnerability in the Pixel Bender
technique to defeat ASLR and DEP. The feature of Adobe Flash Player. The feature is
exploit code for CVE-2014-1776 used a officially deprecated, but the code remains in
maliciously constructed SWF file to load the executable. We noted that the DWORD
Flash Player-related modules and setup value at offset 0xEA of Pixel Bender data was
memory containing vector objects. The responsible for triggering the vulnerability.
UAF vulnerability may be used to overwrite
2 bytes of memory at an arbitrary location. The metadata of defaultValue is intended
By corrupting the first 2 bytes of the vector to be just 4 bytes long, but the code tries
object, which is used as a length field, the to convert all 16 arguments and put them
exploit will gain the ability to access broader in the memory array, incurring a memory
read and write memory space through the corruption error. The original binary data is
vector object. parsed and translated into a bytecode that is
later used for further operations. The second
Code reuse attack value from the defaultValue argument
After acquiring out-of-bounds memory overwrites the index value inside the SEL
read/write access, the exploit would corrupt instruction’s byte code in memory.
another object’s vtable, reusing existing code
fragments from loaded DLLs to defeat ASLR. Based on the nature of the issue and the age
For example, the exploit code for CVE-2014- of the code, we suspect that this vulnerability
0515 uses a fake FileReference function table was found using dumb fuzzing that replaced
to run code from the existing location of the random bytes in the target sample file. The
Adobe Flash Player executable location. bug itself appeared very old and was likely
present from the earliest versions of the Pixel
With fake function table setup, the exploit Bender feature; now, even though the feature
code calls the related method, “cancel.” is no longer supported, the flaw may still hurt
This passes the execution to a location the security of the products.
the attacker designates. This becomes
interesting when the location to which the
control flow is passed is inside the Adobe
Flash Player executable itself.
CVE-2014-1761 was a vulnerability in RTF In this case, what is included inside the
parsing code, as well as a simple buffer Packager is a UNC path to an INF file. The
overflow. The RTF parser has existed in document containing this OLE object would
Microsoft Office for decades, leading us to launch for the INF file automatically without a
reasonably assume the bug has been there victim’s knowledge. Use of the INF file allows
for just as long. The overflow bug class has for a number of dangerous operations.
long been hunted with stack overflow as
the most well-known and easy to locate. By trusting an INF file from an untrusted
Additionally, the code patched for this source it opens a gap that an attacker can
vulnerability is a known problem spot. The exploit to use an INF file to do various
patch for CVE-2014-1761 was released with dangerous things like renaming files and
the MS14-017 security bulletin, but there launching programs.
was another vulnerability (CVE-2012-2593)
Implementation of mitigations in in the same function two years ago and Surgical precision exploits
software such as Windows raises patched with the MS12-079 security bulletin. Even memory-related vulnerabilities such as
the bar on exploitation difficulty, While the bug classes of the vulnerabilities CVE-2014-0515, CVE-2014-1761, and CVE-
and attackers respond with are different, they involve the same RTF key 2014-1776 showed high exploitation success
sophisticated attacks. word and are very similar in nature, using rates. CVE-2014-0515, an Adobe Flash Player
an edge case value for the key word. CVE- vulnerability, was used in an exploit with a
2014-4114, another legacy code vulnerability, heap-spray technique. By laying out memory
exploited the OLE packager feature that has such that the memory corruption changes
existed since Windows® 3.1. the length field of one heap-spray element,
it can achieve full memory read and write
The exploitation of vulnerabilities in legacy access to the process. Once this is achieved,
code is of significant concern from two the attacker has full power over the
angles. It’s important to apply timely patches process itself.
in the enterprise environment; however,
it’s just as important for vendors to invest The CVE-2014-1761 vulnerability was used in
time on legacy code testing and patching. a way that changed the adjacent GFX object
Creating and implementing new managed with surgical precision. When the exploit
languages and new security features on tries to allocate multiple array members, it
decades-old code base is not secure. While can fully control the contents of the memory
matters have improved with the help of the data. The controllability of the data, such that
security community reporting legacy issues, it overwrites a GFX object, is very important.
expect to see these from time to time in In this case, every byte of the data is fully
the future. controllable through RTF key words. The
attackers were sophisticated enough to
Highly successful rate vulnerabilities figure out which bytes are controlled by
Oracle introduced click to play as a security which RTF key word.
measure making the execution of unsigned
Java more difficult. As a result we did not Implementation of mitigations in software
encounter any serious Java zero days in the such as Windows raises the bar on
malware space. Many Java vulnerabilities exploitation difficulty, and attackers respond
were logical or permission-based issues with with sophisticated attacks. The time when
a nearly 100 percent success rate. In 2014, exploits were dependent on luck with
even without Java vulnerabilities, we still saw memory layout is nearly past. Today’s
high success rate exploits in other areas. exploits are highly calculated with memory
layout and exploitation techniques. Many
Logical issue zero-day exploits that emerged in 2014
CVE-2014-4114, found in the wild, was a demonstrated a near-perfect success rate.
logical issue bug involving the OLE packager There has been a decline in attackers using
component. When properly exploited, it was large heap sprays that take a long time and
always successful. The bug involves the OLE get the victim’s attention.
object insertion feature in Office and enabled
users to package a non-OLE object into
a document.
Conclusion Top CVE-2014 numbers
Software vendors continue to make
it more difficult for attackers with the
collected in 2014
implementation of security mitigations, but The most common CVE-2014 exploit
they aren’t enough when they are built on discovered by our teams is CVE-2014-0322. 57
decades-old code still inherently vulnerable. First reported by FireEye in February, 58
The one exception seems to be the CVE-2014-0322 exploits a use-after-free
success of Oracle’s click-to-play mitigation vulnerability in Internet Explorer and
in thwarting Java attacks. While it is more commonly uses an Adobe Flash stage to
difficult for attackers to succeed, we are bypass exploit mitigations in Windows to
experiencing very high success rates with deliver its final executable payload. The
exploits in the wild, which may indicate exploit was first seen in Operation SnowMan,
they were authored by professional exploit which allegedly targeted U.S. government
developers with high exploit development entities and defense companies.
skills. The quality of exploits is improving and
sometimes reveals a deep understanding CVE-2014-6332, 59 also known as “Windows
of the nature of the vulnerability and the OLE Automation Array Remote Code
internals of the target applications. Execution Vulnerability,” is another
vulnerability that attracted a lot of attention
in the security community, especially
Malware and exploits because the vulnerability has been present
Year after year, exploits have been the main in various versions of Windows for over 18
vector for a wide range of malware attacks. years,60 since the days of Windows 95. The
They serve as one of the early steps in exploit is delivered through VB Script, so it
achieving control over the target in a cyber- can only be delivered to Internet Explorer.
attack sequence. 56 Over the years we have It allows for an easy sandbox escape if
seen hundreds of vulnerabilities exploited combined with a routine that changes flags
with different applications and operating to disable Internet Explorer’s Safe Mode.
systems being affected, ranging from Web
browsers to multimedia apps and run-time In the wild, however, the exploit often uses a
environments such as Oracle Java. combination approach, similar to the delivery
of CVE-2014-0322. The exploit is triggered
Every year thousands of CVE numbers by redimensioning an array to transfer
are issued for various vulnerabilities, but control to Adobe Flash shellcode. This
malicious actors are interested in the most bypasses exploit mitigations, including older
serious class of vulnerabilities—the ones that versions of Microsoft’s Enhanced Mitigation
allow the attacker to achieve remote code Experience Toolkit (EMET). A specially
execution. HPE Security Research, together crafted JPG image with an appended
with ReversingLabs, has a catalog of more encrypted data buffer is loaded into memory
than 100,000 exploits collected over the space which, when decrypted by shellcode
course of the year. In this Report we display present in the SWF file, drops and runs the
and discuss 2014’s top trends. final executable payload.61

56
lockheedmartin.com/content/dam/lockheed/
data/corporate/documents/LM-White-
Paper-Intel-Driven-Defense.pdf.
57
c ve.mitre.org/cgi-bin/cvename.
cgi?name=CVE-2014-0322.
58
f ireeye.com/blog/threat-research/2014/02/
operation-snowman-deputydog-
actor-compromises-us-veterans-of-
foreign-wars-website.html.
59
c ve.mitre.org/cgi-bin/cvename.
cgi?name=CVE-2014-6332.
60
s ecurityintelligence.com/ibm-x-force-researcher-
finds-significant-vulnerability-in-microsoft-windows/.
61
r esearchcenter.paloaltonetworks.com/2014/11/
addressing-cve-2014-6332-swf-exploit/.
CVE-2014-0322 Microsoft Internet Explorer 36%
CVE-2014-0307 Microsoft Internet Explorer 25%
CVE-2014-0515 Adobe Flash 11%
CVE-2014-4114 Microsoft Windows 10%

CVE-2014-1761 Microsoft Office 7%


CVE-2014-1776 Microsoft Internet Explorer 3%

CVE-2014-0496 Mozilla Firefox 2%

CVE-2014-6332 Microsoft Windows 1%


CVE-2014-0497 Adobe Flash 1%
CVE-2014-0502 Adobe Flash 1%
Others 3%
0% 5% 10% 15% 20% 25% 30% 35% 40%

Figure 1. Top discovered CVE-2014 exploits

Top CVE-2014 for The breakdown of the top 10 discovered


exploits over different applications is as
malware attacks follows. Four exploits are delivered through
Internet Explorer; these four together
As discussed above, of the top 10 CVE-2014
account for almost two-thirds of all
exploits seen, none of them targets Java, one
CVE-2014-based exploits discovered this
of the most commonly exploited targets in
year, Two Windows exploits are delivered
previous few years. This may indicate that
using Microsoft Office files, three using
the security push,62 which caused delay in
the release of Java 8, is getting some results, Adobe Flash, and one through
although it may be too early to tell. It may Adobe Reader.
also be a consequence of browser vendors
In-depth analyses of CVE-2014-0505,64
blocking outdated Java plugins63 by default,
CVE-2014-1761,65 CVE-2014-4114,66 and
making the platform a less attractive target
CVE-2014-177667 have been published on the
for attackers.
HPE Security Research blog over the course
of the year.

62
t hreatpost.com/does-java-8-delay-mean-
oracle-finally-serious-about-security/99908.
63
b logs.msdn.com/b/ie/archive/2014/08/06/
internet-explorer-begins-blocking-out-
of-date-activex-controls.aspx.
64
h 30499.www3.hp.com/t5/HP-Security-Research-
Blog/Technical-Analysis-of-CVE-2014-0515-
Adobe-Flash-Player-Exploit/ba-p/6482744.
65
h 30499.www3.hp.com/t5/HP-Security-
Research-Blog/Technical-Analysis-of-CVE-
2014-1761-RTF-Vulnerability/ba-p/6440048.
66
h 30499.www3.hp.com/t5/HP-Security-Research-
Blog/Technical-analysis-of-the-SandWorm-
Vulnerability-CVE-2014-4114/ba-p/6649758.
67
h 30499.www3.hp.com/t5/HP-Security-Research-
Blog/The-mechanism-behind-Internet-Explorer-
CVE-2014-1776-exploits/ba-p/6476220.
Top CVE numbers exploit samples. This vulnerability in shell32.
dll allows the attacker to plant a specially
seen in 2014 crafted .PIF or .LNK file, which triggers
the vulnerability when a user browses the
Although we have seen over 30 CVE-2014
content of the folder containing the malicious
exploits used by malware, the majority of
files. The exploit was used as one of the
exploits discovered by our teams attempt to
infection vectors for Stuxnet and quickly
exploit older vulnerabilities. By far the most
gained popularity in the world of
common exploit is CVE-2010-2568,69 which
malware writers.
roughly accounts for a third of all discovered

CVE-2010-2568 Microsoft Windows 33%

CVE-2010-0188 Adobe Reader and Acrobat® 11%

CVE-2013-0422 Oracle Java 9%

CVE-2012-1723 Oracle Java 7%

CVE-2012-0507 Oracle Java 4%

CVE-2012-0158 Microsoft Office 4%


3%
CVE-2013-2465 Oracle Java

CVE-2012-4681 Oracle Java 3%

CVE-2013-2423 Oracle Java 2%

CVE-2009-3129 Microsoft Office 2%

Others 22%

0% 5% 10% 15% 20% 25% 30% 35% 40%

Figure 2. Top exploit samples in 2014; note CVE numbers, which are a useful guide to when the vulnerability was
first reported

In fact, CVE-2010-2568 is the only exploit of Windows users who do not regularly
for which the number of discovered samples update their systems with security patches.
grew month over month throughout the year. This issue may have been exacerbated by
Microsoft ending support for Windows XP
The breakdown of the top 10 overall exploit security updates in April73 for most users
samples discovered this year is quite (and not counting the emergency MS14-021
different compared to only CVE-2014 exploit patch released in late April).
samples. Oracle Java holds the top place
in terms of numbers with six exploits in Looking at the operating systems targeted
the top 10, accounting for 29 percent of all by exploits, it is obvious that attackers are
discovered samples, with CVE-2013-042269 still concentrating on Windows, despite high-
being the most popular of Java exploits. profile vulnerabilities in other technologies,
These are followed by the already mentioned such as CVE-2014-627174 (Shellshock), that
CVE-2010-2568 targeting Windows; CVE- were discovered in 2014.
68
c ve.mitre.org/cgi-bin/cvename.
cgi?name=CVE-2010-2568.
2010-0188,70 which targets Adobe Reader,
accounting for 11 percent of samples; CVE- The most common exploit encountered for
69
c ve.mitre.org/cgi-bin/cvename.
cgi?name=CVE-2013-0422. 2012-015871 targeting Microsoft Office with non-Windows operating systems targeted
70
c ve.mitre.org/cgi-bin/cvename. 4 percent of samples; and CVE-2009-312972 CVE-2013-4787,75 also known as the Android
cgi?name=CVE-2010-0188.
targeting Microsoft Excel®, with less than Master Key vulnerability. Samples targeting
71
c ve.mitre.org/cgi-bin/cvename.
cgi?name=CVE-2012-0158. 2 percent of all exploit samples discovered this vulnerability accounted for a little over
72
c ve.mitre.org/cgi-bin/cvename. in 2014. one percent of all exploit samples.
cgi?name=CVE-2019-3129.
73
 icrosoft.com/en-us/windows/
m
enterprise/end-of-support.aspx.
The discovered exploit samples indicate
74
c ve.mitre.org/cgi-bin/cvename.
that there is still a significant percentage
cgi?name=CVE-2014-6271.
75
c ve.mitre.org/cgi-bin/cvename.
cgi?name=CVE-2013-4787.
10,000 CVE-2010-2568
CVE-2010-0188
9,000
CVE-2013-0422
8,000 CVE-2012-1723
CVE-2012-0507
7,000
CVE-2012-0158
6,000 CVE-2013-2456
CVE-2012-4681
5,000
CVE-2013-2423
4,000 CVE-2009-3129

3,000

2,000

1,000

0
ar
y
ar
y
rc
h ri
l
Ma
y ne ly st er er er
nu ru Ma Ap Ju Ju gu mb t ob mb
Ja Fe
b Au pt
e Oc ve
Se No

Figure 3. Monthly breakdown of the top 10 exploit samples discovered in 2014

Looking at the file types used to deliver by PDF files, HTML (JavaScript), and Word
exploits through Web browsing or email (OLE2) documents. These account for
attachments, Java applets and class files 33 percent, 10 percent, and 5 percent of
are the most common and account for 48 discovered malware samples respectively.
percent of all samples of this set, followed

Java 48%

PDF 33%

HTML 11%

Word 5%

SWF 3%

Excel 0.4%

Multimedia 0.18%

PowerPoint® 0.03%

CHM 0.01%

0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%

Figure 4. Web or email exploit samples by file type


Defenders are global 3. Italy
4. France
Zero Day Initiative’s researchers:
Geographic distribution 5. Poland
In its first decade, the HPE Zero Day Initiative
has received over 7,000 submissions from Over the past two years, several new hot
80 countries around the world. Taking spots popped up with high submission
a closer look at the data, an interesting rates and quality technical analysis
perspective emerges on where in the world including Germany, South Korea, China,
vulnerability research is occurring. The and the Russian Federation. Researchers
following list shows the countries with the in these countries are not only focusing on
highest submission rate since the vulnerability discovery but also on innovative
program’s inception: exploitation techniques. The coverage
map below pinpoints the countries actively
1. United States submitting unpatched vulnerabilities to
2. Canada the program.

Figure 5. ZDI researcher coverage map


Conclusion Examining 2014 submissions revealed a mix
of “old” and “new” vendors at the top for
Researchers and analysts in the HPE Zero most disclosures:
Day Initiative were busy coordinating the 1. Microsoft
disclosure and remediation of over 400 high-
severity vulnerabilities in 2014. This year 2. Hewlett Packard Enterprise
marks the highest number of disclosures in a 3. Advantech
single year. 2013 brought quite a few Oracle
Java sandbox bypasses to the program. 4. SAP
In 2014, however, researchers shifted to 5. Apple
browser vulnerabilities, focusing most of their
efforts on Microsoft Internet Explorer. In 2013 there were a number of SCADA
Looking ahead, we will continue vulnerabilities, but 2014 marks the first
ZDI researchers tuned their browser fuzzers year where a SCADA vendor is among the
to see a focus on browsers to discover dozens of UAF vulnerabilities. A
and plugins. top vendors with vulnerabilities disclosed
use-after-free vulnerability can occur when against its products. Advantech focuses on
memory is allocated to an object that is used automation controllers, industrial control
after it is deleted (or deallocated). Good products, and single board computers. SAP
programming practice dictates that any is on the list due to an audit ZDI analysts
reference pointing to an object should be conducted against one of its products, which
modified when the memory is deallocated, yielded a large number of findings.
to keep the pointer from continuing to
make the area of memory where the object Looking ahead, we will continue to see a
once resided available for use. (A pointer in focus on browsers and plugins that support
this abandoned condition is broadly called them. The attack surface offered by the
a “dangling pointer.”) If the pointer isn’t complex software is used heavily when
modified and tries to access that area of targeting governments and
memory, the system can become unstable high-profile organizations.
or corrupt. Attackers can use a dereferenced
pointer in a variety of ways, including
execution of malicious code.
Threats org, a reputable independent anti-malware
testing organization, collected 83 million
malware samples. For 2014 the final number
The end game of many attackers that exploit is expected to be close to 140 million. If we
vulnerabilities is to install various types simply extrapolate the numbers, we can be
of malware. In 2014 the malware problem almost certain we will reach the 200 million
continued unabated, and while the anti- mark in the coming year.
malware industry has introduced multiple
new approaches to the issues it faces, the If we consider that 200 million number, we
impact of those measures on the security of see that to reach it over the year, AV-Test—
organizations and the public is questionable. or any reputable anti-malware vendor—
Increasingly, anti-malware technologies should be capable of processing an average
rely on monitoring for particular behaviors of 600,000 samples every single day. The
rather than monitoring for the presence of increasing number of samples poses great
particular files, and they harness Big Data challenges for anti-malware engines, and the
and cloud capabilities in order to detect and rates of detection for previously unknown
address new malware families by aggregating malware instances are declining.
multiple data points and dimensions. By
utilizing these technologies, the ability to Our tests on standard scanning engines,
detect malicious files heuristically (that is, conducted over a set of over 80 million
to identify malware not seen before based samples in cooperation with ReversingLabs,
strictly on its characteristics) has improved— show that detection of previously unknown
but nowhere near enough. The defenders samples at the moment of discovery
are worried—are we winning the war against significantly varies from vendor to vendor.
malware, or are we going to be swept away This illustrates the need for complementary
by the rising tide? protection technologies that provide more
dynamic protection. These technologies
are usually built into most endpoint
Windows malware overview security products.
State of protection
Year after year, the number of newly created
malware samples balloons. In 2013, AV-Test.

140

120

100

80
Millions

60

40

20

0
2005 2006 2007 2008 2009 2010 2011 2012 2013 2014

Figure 6. Unique malware samples collected by AV-Test


100%
100%

96%
95%
95%
93%

91%
90%

85%
85%
83%
81%
81%
80%
80%

75%
A B C D E F G H I J

Figure 7. Various anti-malware vendors’ detection rates on previously unknown samples (normalized relative to the
best-performing engine)

Relatively low rates of change of detection Unfortunately, the level of technical skill,
for samples a week or longer after their experience, and knowledge required to
discovery show that many malware threats address targeted attacks is high. There is a
are transient, with their initial distribution skill shortage, usually addressed by installing
lifecycle lasting a day or less. In addition, this a combination of incident response software
may indicate the inability of anti-malware and systems (such as sandboxes) designed
vendors to process an ever-growing number to detect whatever portion of the attacker’s
of incoming samples. tools and malware managed to penetrate
traditional layers of defense.
The sheer volume of malware samples that
appears every day plays into the hands of The focus for organizations is not just how
actors with sufficient funds to conduct highly to protect, but rather how to respond and
skilled targeted attacks and evade all layers remediate attacks—understanding with
of traditional protection. Large organizations certainty that attacks will be successful if
have recognized the need to build security carefully planned and executed.
operations centers (SOCs) with skilled staff
able to recognize, respond to, and remediate
attacks when they happen.
Top malware discovered shows that the most commonly
The top Windows malware discovered encountered malware families are the
shows a slightly different view on previously ones that either have the ability to replicate
unknown samples. In our practice we have and create a functionally identical copy
gotten used to a way of counting unique (worms) or an ability to modify another
binary files as single instances, which works executable to include its own functionality
well in the case of Trojans—that is, malware (parasitic viruses).
that is unable to replicate itself. Our data

Unclassified (Other) 82%


Agent 4%
Ramnit 3%
Sytro 3%
Virut 2%
Zbot 1%
Xpiro 1%

Sality 1%

LDMon 1%
Online games 1%
Loring 1%

0% 10% 20% 30% 40% 50% 60% 70% 80% 90%

Figure 8. Top malware samples discovered by ReversingLabs in 2014, by family

By far the most commonly reported malware Most of the other top 10 collected malware
Agent is a malware name that name is Agent. However, this name is not has the ability to replicate: Virut, Sality, and
is used as a name space for all used for a single family, but rather as a Expiro are polymorphic infectors that have
malware samples that cannot be name space for all malware samples that been present for many years and may be
easily classified. cannot be easily classified into any other used for information stealing, while Ramnit
known existing families. Again, this is directly is a worm designed to steal information such
related to the volume of malicious files that as online banking credentials. Onlinegames
need to be processed. The ability to fully is a password stealing malware designed
analyze all malware, recognize what it is, and to steal the credentials of online games. In
determine what it does is often beyond the fact, it seems that the majority of the top 10
means of many AV companies. When a file is malware is geared toward stealing data as
determined to be malicious, the pressure to opposed to immediately obtaining financial
detect large volumes of files means that once benefits, as is the case with fake anti-
researchers know enough to add detection malware and ransomware samples.
for the file, they move onto the next—only
doing the minimum amount of security
research necessary.
Notable malware ransomware threats, however, this
cyber-criminal business model appears
Ransomware to be quite successful.
Although the concept of ransomware goes
back to the days of the DOS operating system, High-complexity malware
it is only in the last couple of years that it The best-known example of high-complexity
has become a contender to fake or rogue malware is Stuxnet,80 which was designed
anti-virus software in prevalence and the to attack industrial systems, particularly
potential to cause damage to victims’ data. centrifuges used for the enrichment
of uranium in the Iranian Natanz fuel
Perhaps the most notable ransomware is enrichment plant. Malware such as Stuxnet
CryptoLocker, which appeared at the end poses a lot of questions for a malware
of 2013 and caused a lot of damage to researcher. Some questions are never
end users and organizations until the FBI’s answered, and some are answered only after
operation Tovar76 disrupted its distribution lengthy, iterative research, where even the
channel and brought down a large Gameover smallest clues are followed. In the case of
Zeus botnet. Stuxnet, new details were revealed81 in 2014,
almost four years after the malware was
Nevertheless, the business model in which first discovered by the malware
users’ data is held for ransom by malware research community.
using asymmetric encryption algorithms to
encrypt it has spurned a number of copycats, The year 2014 marked the discovery of
with CryptoWall77 being the most well-known. another highly complex malware suspected
to be developed by an organized and
In addition to the ransomware that actually well-funded group of developers—Regin.82
encrypts the data (so that the only way Regin is a multi-component malware
to recover is to restore it from unaffected designed as a framework that allows for the
backup media), another class of malware that creation of multiple plugins. Regin employs
simply locks user access to the operating sophisticated hiding methods and encrypted
system (e.g., Reveton78) or to the Web virtual file systems, and was designed for the
browser (e.g., Krypterade79) is also very purpose of security intelligence gathering
prevalent but thankfully much easier by continuously monitoring individuals and
to remove. organizations. It may have been in use since
2008, but the first samples were discovered
Ransomware threats are here to stay and by Symantec and Kaspersky researchers
76
f bi.gov/news/pressrel/press-releases/u.s.-
leads-multi-national-action-against- organizations must have a sound backup as recently as 2013. The research shows
gameover-zeus-botnet-and-cryptolocker-
ransomware-charges-botnet-administrator.
and restore policy in place for all business that many components of Regin are not yet
77
s ymantec.com/security_response/writeup.
data in order to mitigate the potentially discovered and additional functionality and
jsp?docid=2014-061923-2824-99. destructive effects of a successful attack. versions may exist in the wild.
78
k rebsonsecurity.com/2012/08/inside-a- Not much detail is known about individuals
reveton-ransomware-operation/.
and organizations that resort to the last Once again, this supports our conclusion that
79
 icrosoft.com/security/portal/threat/Encyclopedia/
m
Entry.aspx?Name=Ransom:JS/Krypterade.A#tab=2. desperate step of paying attackers the a skilled attacker will be able to penetrate
80
langner.com/en/wp-content/uploads/2013/11/ money, nor whether the required data (or all traditional levels of defense and maintain
To-kill-a-centrifuge.pdf.
the private key required for decryption) access to victim systems by choosing attack
s ecurelist.com/analysis/publications/67483/
tools that will not show up on the radar of
81

stuxnet-zero-victims/. is delivered to victims after the ransom


82
s ymantec.com/content/en/us/enterprise/media/ money is paid. Judging by the prevalence of anti-malware and other protections.
security_response/whitepapers/regin-analysis.pdf.
Other trends that prevented automatic startup of code
It is worth mentioning a mini-comeback83 when a document was opened. However,
for Visual Basic for Applications (VBA) as this year we have observed VBA, embedded
a platform for delivering malicious content in Microsoft Office XML format documents,
through email attachments. VBA malware acting as the first stage of infection and
was particularly popular in the last years downloading or dropping additional malware
of the 20th century, with macro viruses components. This, however, had to be
accounting for a significant proportion of all achieved by using social engineering tricks
malicious samples. In the past, the malicious to convince users to open the document and
code would use OLE automation techniques explicitly allow the VBA macro embedded in
to access the Microsoft Outlook® automation the file to run.
interface, sending the infected document as
an attachment or simply propagating to all Another trend is the reappearance of Visual
opened documents by inserting malicious Basic Script (VBS) malware, with the most
code into the standard Normal.dot template. common family being the Jenxcus84 worm.
Jenxcus is a relatively simple worm, which
For a long time it was thought that malicious owes its success to inventive techniques
VBA code was extinct thanks to Microsoft’s used for spreading and launching itself.
introduction of additional security features

1,000
High
979
800

600

400

200 Low
116

0
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov

Figure 9. Top malware samples discovered by ReversingLabs in 2014, by volume per month

The worm is often delivered through a by a malicious TOR exit node. It works
fake Adobe Flash updater setup file whose by intercepting downloads of Windows
download is triggered when the user visits executable files and modifying downloaded
a maliciously crafted website—for example, files on the fly to include additional malicious
a spoofed YouTube site. Once opened, components designed to gather intelligence
Jenxcus enumerates mounted network and steal user’s data that is uploaded to the
drives and copies itself to them. In addition malware’s command and control servers.
to that, Jenxcus creates a link with a base
file name identical to the base name of a The key take away from the Onionduke
file that already exists on the drive. Users story is that using TOR may help users stay
may unknowingly click on the malicious link anonymous, but it will not make them secure.
instead of the file and launch the malware TOR users must remember that the Internet
on their systems. Jenxcus also provides traffic is routed through TOR exit nodes,
a backdoor to the infected computer by and not all participants in the TOR network
connecting to a website and allowing the can be considered benevolent. Furthermore,
attacker to send commands to control it. users should not download executable files
via TOR (or anything else) without using
We finish this brief overview of notable some sort of network encryption mechanism
83
v irusbtn.com/virusbulletin/
archive/2014/07/vb201407-VBA. malware discovered in 2014 with such as VPN.
84
 icrosoft.com/security/portal/threat/Encyclopedia/
m Onionduke.85 Onionduke is malware delivered
Entry.aspx?Name=Worm:VBS/Jenxcus#tab=2.
85
f-secure.com/weblog/archives/00002764.html.
Proliferation of .NET of advanced automated malware analysis
that could target .NET applications—fueled
malware in 2014 an ongoing interest in .NET malware
development by various actors.
There was a marked increase in .NET
malware in 2014, and there are multiple
While MSIL platform malware initially lacked
reasons why malware authors found this
the obfuscation and complexities of Win32
platform so attractive. The ease of the
malware, actors have become increasingly
development platform, the availability
inventive in using MSIL code injections, MSIL
of extensive libraries, the promise of
obfuscations and encryption. In 2014 we
multiplatform support, and the somewhat
observed the following .NET malware and
rudimentary state of the instrumentation and
adware in the wild.
emulation by AV engines—as well as the lack

Barys High: 15,105


Ranos
Kryptik
Disfa
Bladabindi
Archsms
Fsysna
Codewall
Cryptos
Sisbot
Reconyc
Darkkomet
Zusy
Krypt
Forucon
Ilcrypt
Jintor
Badur
Asd Low: 3,894

0 2,000 4,000 6,000 8,000 10,000 12,000 14,000 16,000

Figure 10. Top 20 .NET malware prevalence and distribution by family in 2014, from ReversingLabs data

On the top of the list of most prevalent becomes considerably more even, without
.NET malware families we see Barys, Ranos, major spikes. This shows that the vectors
Kryptik, Disfa, and Bladabindi. Fsysna, of propagation remain consistent and are
Codewall, and Sisbot appear at about mostly associated with spam and social
the same level of prevalence. Beginning engineering downloads and not with major
from Fsysna the prevalence distribution product-vulnerability exploits.
Ranos Bladabindi displays the following behavioral
This is a .NET Trojan developed to download and functional characteristics:
and execute various malware families. There
• Bladabindi .NET malware variants often
appears to be some naming confusion
have backdoor functionality that allows
between Kazy and Ranos, however;
unauthorized access and control of a
whereas Kazy is classified as adware, Ranos
victim’s computer.
is malware and is classified as a Trojan
downloader. Due to its association as the • Some variants use a pluggable architecture
downloader of other malware families, that may allow the Trojan to be updated
some variants of Ranos are misidentified with new functionality after it is installed on
as Bladabindi and Strictor. Ranos a victim’s computer.
displays the following behavioral and
• The malware adds a run key to the registry
functional characteristics:
to execute when the system starts.
• The majority of Ranos is written in .NET.
• Bladabindi allows access to private
• Most variants of Ranos carry a compressed information such as volume information,
portion of their code in the resource computer name, OS version, user name,
area and are partially compressed and and so forth.
encrypted using the DNGuard .NET
• The malware’s backdoor functionality
obfuscator and code protector. The
allows an attacker to manipulate files and
protected code is stored in the resource
folders as well as registry and firewall
section and is handled by the
settings on the victim’s computer.
ZYDNGuard method.
• Some variants of Bladabindi are also
• The developer metadata tends to contain
known to dynamically inject MSIL code
information that aims to entice or socially
for obfuscation purposes, which further
engineer a user into opening a file (the
hinders analysis.
Trojan has been distributed with filenames
such as pictures.exe, Flash Player.exe, and
Barys
so forth).
Barys is a .NET malware family, some
• Most of Ranos’ functionality is for variants of which are often misidentified
downloading and dropping arbitrary files as Bladabindi. Barys displays the following
from remote locations. behavioral and functional characteristics:
• Ranos has been observed to modify • The Trojan drops itself into the Start
Windows hosts files in order to thwart Menu’s Startup folder, thus ensuring that
antivirus and Windows update activities. it starts at every system start (unless user
manually deletes it).
• Ranos tends to be distributed in files sized
between 200 kb to 400 kb. • It modifies firewall rules.
• The Trojan uses strings obfuscation, as well
Bladabindi
as injecting itself in memory, thus further
Bladabindi is a very broadly reported
complicating its analysis.
malware family, often misidentified in
practice. It is often confused with Zusy, Kazy, • The Trojan has a proxy functionality and
Disfa, and other MSIL malware families. Such may be used to relay Internet traffic.
name confusion and misidentification make
it difficult to accurately judge prevalence and
identify succinct behavioral characteristics
with automated analysis. However,
Sysbot detected. At the same time the reports of
Sysbot is a .NET IRC bot malware family. such malware from the wild are low enough
Sysbot displays the following behavioral and that they tend to remain under the general
functional characteristics: public’s radar. The most notable .NET
malware families in this category are Tyupkin
• It drops itself as svchost.exe in the start
and Padpin. The malware runs in place of
menu, ensuring it executes at system start.
ATM-controlled programs and intercepts
• It connects to IRC servers and uses coded keypad requests to dispense the cash
predefined usernames to signal its activity. to interested actors.
• The worm ultimately gives unauthorized
Attribution of .NET malware to the Syrian
access to the infected computer and sends
conflict
sensitive information to a remote attacker
2014 was a year of much political and civil
In 2014 we saw an increase in including IP address, processor, OS,
unrest around the world, including civil
.NET malware related to ATM enumerated USB devices, and logical
unrest and ongoing armed conflict in Syria.
attacks. Such malware is installed drives information.
The conflict coincides with a notable spike
on the machine and controlled • The bot has the ability to update itself, in the development and propagation of
through the keypad. which essentially allows it to download and malware attributed to the region, and .NET
install arbitrary files from remote locations. malware is a feature. Samples were spread
through a number of compromised social
• The worm is moderately string-obfuscated,
media accounts associated with both sides
which further complicates its analysis.
of the conflict. There are cases in which
• The worm has multiple vectors it can use Facebook pages were used to distribute
for propagation, including via IRC, MSN malware, and others where users were
messenger, P2P networks, FTP servers, enticed into downloading and running
Facebook, and YouTube accounts, as well executables linked from political videos
as removable USB drives. posted on YouTube. The samples were not
heavily obfuscated and ranged from RATs
• When spreading through IRC channels it
to Trojan droppers and downloaders. Some
entices users through social engineering to
malware associated with Syrian malware
download and execute content.
families are not strictly defined and may be
• The worm can also use MSN Messenger detected as Variant.Kazy, Injector, MSIL.UL,
to send files and copies of itself to various MSIL.Agent, or Ransomlock. These generic
P2P client download locations with name detections suggest the wide reuse
enticing names. of malware components and sources, and a
lack of heavy obfuscation and
• In the case of spreading via FTP servers,
encryption techniques.
it attempts to copy itself to ftp://<host>/
index.exe, possibly hoping to be mistakenly Overall, we see an increasing number of
executed in an attempt to get the .NET malware appearing on the scene.
host’s index. Actors are enticed by the promise of
multi-platform execution, the availability of
numerous third-party libraries and tools, and
ATM malware attacks ease of development, coupled with ever-
In 2014 we saw an increase in .NET malware increasing levels of anti-debugging and code
related to ATM attacks. Such malware is obfuscation techniques.
installed on the ATM and controlled through
the ATM keypad. The majority of ATM host
environments run a Windows OS and allow
seamless execution of .NET applications.
Because these systems are rarely examined
by anti-malware software, such malware may
persist for long periods of time without being
Linux malware is served by servers that are running some
flavor of Linux, which makes Linux-based
Usually, when we discuss malware, the focus systems, and especially server applications,
is on Windows malware. This is due to the an attractive target for attackers.
popularity of the platform for desktop users
and the use of Windows as the main platform In the last couple of years there has been
in many corporate environments. However, if a renewed interest in malware written for
we consider server infrastructure—especially Linux, and we felt that it was important to
the servers that serve the majority of examine this in our report.
Internet content—we see that the picture
is somewhat different. Apache server is the Top Linux malware
most common86 HTTP server application We tend to hear more about Linux when a
today and serves content on almost 60 major vulnerability in software is connected
percent of all websites, usually running on a with it, such as was the case with CVE-
Linux server distribution. The second most 2014-6271 (Shellshock). The majority of
common HTTP server application, nginx, Linux malware belongs to categories that
accounts for more than 22 percent of HTTP allow attackers to use affected systems as
servers and usually also runs on a non- platforms for launching Distributed Denial of
Windows platform. It is safe to assume that Service (DDoS) attacks.
over 80 percent of Internet HTTP content

9% Elknot
Mayday
6%
Tsunami
4%
Rst
4% Ganiw
3% Roopre
3% Flooder
2% Shark
66%
1%
Dofloo
1%
Aidra
1%
Others

Figure 11. Top Linux ELF (Executable and Linking Format) malware discovered by
ReversingLabs in 2014, by family

However, in the top 10 Linux ELF-based the Internet for small office or home Internet
malware discovered in 2014, there are a routers and other devices and to spread by
couple of exceptions to the DDoS theme. exploiting vulnerabilities or using default
The first of the exceptions is RST, a parasitic credentials if the telnet service on the target
virus that’s been around for more than 10 is running.
years. It infects other ELF executable files;
this is an older style of malware and its Aidra and Darlloz belong to a relatively
inclusion in the list of top Linux malware is an new class of malware that exposes some
indication that there is little awareness of the of the risks posed by different Linux
need to run anti-malware software on implementations on small devices. With the
Linux systems. development of the Internet of Things, many
non-obvious computing devices will run
The second exception is the Aidra87 worm, Linux and connect to the Internet so we can
accounting for more than 1 percent of all expect more attacks like this in the next
discovered ELF samples. Aidra, together with few years.
its counterpart Darlloz, is designed to scan

86
w3techs.com/technologies/overview/web_server/all.
87
now.avg.com/war-of-the-worms/.
Other interesting Linux malware in a scripting language, such as PHP or Perl,
Linux, just like Windows, runs not just the or by modifying the server binary code, if
kernel and standard OS tools but a number access to the Web server user account has
of other third-party applications. This holds been obtained through a system exploit or
especially true for Web servers, which are by using stolen user credentials.
used to run many Web applications and open
source content management frameworks The most popular language for script
such as Wordpress, Joomla, and Drupal. malware on non-Windows platforms is
PHP, and we have discovered thousands
In addition to that, the developers of Web of new samples in 2014. The majority of
applications often use these open-source samples are used for one of three main
frameworks as base platforms for their purposes. The first, as seen in the Redirector
own applications. Modifying standard family for example, serves to redirect Web
frameworks can prevent easy updating of the browser applications to other sites in the
underlying framework when a vulnerability is Web malware infection chain. The second
discovered. This makes many applications on purpose, as seen in C99shell and Webshell,
the Internet vulnerable to attacks, allowing is to allow backdoor access to the affected
attackers to modify applications so that they server through a Web user interface. The
serve malicious content to website visitors. third category belongs to PHP scripts
planted to recruit the host system into a
The malicious content usually takes the form botnet for spamming or launching DDoS
of additional JavaScript routines generated attacks. Spambot, Pbot, and Ircbot belong to
by server-side code uploaded by attackers. this category.
The server-side code can be implemented

Agent
1%
Redirector
2% 13% Alter
2%
2% C99shell
34% Webshell
5%
Faketool
6% Spambot
Ircbot
11% Pbot
13%
Siggen
11%
Others

Figure 12. Top PHP malware noted by ReversingLabs in 2014, by family

The most interesting publicly known case The security of Linux servers has a direct
of a wide server side compromise is known influence on the security of Windows
as Operation Windigo.88 Windigo operators desktops, as the Web is one of the main
affected over 30 thousand servers using vectors for delivering malicious content.
a combination of Ebury,89 ssh credential- The greater the number of Linux servers
stealing malware, and Cdorked90—modified compromised, the higher the probability
Apache HTTP daemon binaries that that attackers will succeed in attacking
redirected to malicious content and exploit users visiting compromised websites. In
toolkits designed to silently install and run addition to this, if awareness of the need
several Windows malware families. to protect Linux servers is not better
developed, attackers will continue to use
The operators behind Windigo made their Linux as a major platform for launching spam
money by sending spam from infected Linux campaigns and recruiting systems into DDoS
88
 elivesecurity.com/wp-content/
w servers and Windows systems. The Linux botnets with great bandwidth potential.
uploads/2014/03/operation_windigo.pdf.
spamming side was implemented by a Perl-
 elivesecurity.com/2014/02/21/an-in-
w
based malware called Calfbot.91
89

depth-analysis-of-linuxebury/.
90
 elivesecurity.com/2013/04/26/linuxcdorked-new-
w
apache-backdoor-in-the-wild-serves-blackhole/.
91
virusradar.com/en/Perl_Calfbot.A/description.
Mobile malware of them targeting the Android platform. The
actual reported numbers vary from company
The year 2014 was a significant one for to company, but the general consensus
mobile malware. It was the year when mobile inside the anti-malware industry is that there
malware stopped being considered just a are over one million unique malicious apps
novelty. After all, in July we “celebrated” 10 known today, with several thousand more
years since the discovery of the first malware discovered on a daily basis.
for mobile devices92—Cabir or Caribe.
Reasons for the popularity of the Android
Cabir, which targeted the Nokia Series 60 platform for the development of malicious
Symbian platform, was a worm that used apps are obvious. Android has become the
the Bluetooth OBEX protocol to spread from most popular mobile platform, with over
smartphone to smartphone. It was proof-of- 1 billion93 active users and over 1.5 million
concept malware created by the virus-writing more registered every day.94 Its reported
group 29a (hexadecimal 666)—well-known market share is over 70 percent.95 Google
for developing innovative pieces of malware Play market, the most significant source of
at a time when malware developing was Android app distribution, currently hosts
more of a hobby than a way to make money over 1.3 million apps but there is a large
and attack organizations. number of third-party app stores in the
United States and worldwide, especially in
Fast-forward 10 years and we are seeing China. These marketplaces, which often have
exponential growth in the number of less oversight, contribute to the growing
discovered malicious apps, with the majority malware problem on Android.

Android
iOS Masterkey
Windows Android
Symbian Xrove Kongfu 2013
WinCE Android
Wallpapers 2012
Relative market share

2006 IKEE Android


iOS 2010
2009
Meiti Koler
WinCE
2008 Android
DroidDream 2014
Android
2011
FlexiSpy
Drever Symbian
Symbian 2007
2005
Cabir
Symbian
2004

2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014

Figure 13. Ten years of mobile malware; note the rapid rise in Android popularity (and decline in Symbian popularity)
in the last five years96, 97, 98, 99

92
n akedsecurity.sophos.com/2014/06/01/from-
cabir-to-koler-10-years-of-mobile-malware/.
93
e ngadget.com/2014/06/25/google-
io-2014-by-the-numbers/.
94
a ndroidcentral.com/larry-page-15-million-
android-devices-activated-every-day.
95
stats.unity3d.com/mobile/os.html.
96
z dnet.com/article/mobile-os-market-shares-
in-2005-symbian-51-linux-23-windows-17/.
97
gartner.com/newsroom/id/910112.
98
s tatista.com/statistics/266136/global-market-
share-held-by-smartphone-operating-systems/.
99
idc.com/prodserv/smartphone-os-market-share.jsp.
Android anti-malware market Meanwhile Google is not encouraging
reports coming from anti-malware vendors,
Since the discovery in August 2010 of the claiming that only 0.0001 percent of devices
first malware for Android, Google’s approach may ever encounter a malicious app.100
to allowing security apps for Android was That claimed number is backed by the
very different from Apple’s. While Apple data collected by the Google Play app. On
exposed very little data that could be used the other side of the spectrum, vendors
for inspection and on-device malware such as Kaspersky are reporting that
classification and was actively discouraging the rates101 of malicious apps are several
development of security software for iOS, orders of magnitude higher on Android
Google took a more hands-off approach and devices protected by their own software.
allowed anti-malware vendors to develop The disparity between Google’s and other
anti-malware software and publish it to vendors’ data may arise from the fact that
Google Play. Google only measured downloads from
Google Play market, while other vendor
However, a decision has been made that reports account for installs from all sources.
anti-malware apps on Android will not have
any special privileges. As a result, unless According to av-test.org, current anti-
the device is rooted, anti-malware apps are malware products for Android, although
unable to prevent infection, but can only being rather rudimentary in terms of
detect the installation of malicious apps onto available technology and detection
the device and open a standard Android techniques compared to their Windows
dialog that allows the user to remove the counterparts, are quite effective against
detected app. known Android malware, with detection rates
over 99 percent102 achievable by the majority
APIs used by anti-malware solutions on of reputable vendors.
Android are available to any apps allowed to
listen to events triggered by the operating At the same time, with the release of
system when apps are installed. That may be Android 4.2 Google included its own Verify
one of the reasons for the large number of Apps anti-malware feature into the Google
Android AV offerings—over 300 alleged anti- Play app. Verify Apps is an app scanner; it
virus and anti-malware apps are currently started as a simple feature that used SHA1
hosted on Google—including all the checksum calculation and cloud (Google
traditional vendors with significant market Safe Browsing) API lookup to check apps for
share in the world of desktop anti-malware. known-malicious samples during installation.
With the release of Android Lollipop (5.0),
Nevertheless, awareness around the Verify Apps has evolved more sophisticated
existence of security software for Android protection mechanisms. These include re-
is relatively low. While we can expect more scanning of apps after they are installed, as
than 90 percent of Windows systems to be well as scanning of apps outside the Google
protected by security software, the overall Play market. We can expect that the Verify
protection level of Android devices is lower. Apps functionality will develop into a fully
We estimate that just below 40 percent of featured anti-malware product, which will
Android devices have some kind of anti- certainly be welcomed by Android users and
malware solution installed (based on the the security industry.
numbers displayed by Google Play market),
which may be a bit low considering that
the number of malicious apps for Android
discovered daily is close to the number
of Windows malware samples discovered
around 10 years ago.

100
infosecurity-magazine.com/news/google-
android-malware-threat-is-vastly/.
101
 edia.kaspersky.com/pdf/Kaspersky-Lab-
m
KSN-Report-mobile-cyberthreats-web.pdf.
102
a v-test.org/en/news/news-single-view/32-
protection-apps-for-android-put-to-the-test/.
Top Android malware for malware that cannot be classified with
high certainty into any well-known family.
families in 2014 Agent is followed by some of the usual
suspects—for example, Opfake and Boxer,
As expected, the majority of Android
two related families originating and mostly
malware discovered in 2014 was found
targeting users in the Russian Federation
outside of the Google Play market, although
and neighboring countries.
there are instances in which malware was
placed on Google Play by maliciously
However, it is the families that are not seen
created developer accounts. The biggest
in most top 10 Android malware family lists
family, similar to the situation with Windows
that have caught our attention, because they
platform, is Agent, which is a standard
follow successful patterns previously seen
name reserved by anti-malware companies
and frequently used in Windows malware.

Agent
10% Stealer
6% Fakeinst
Smsagent
5%
Mseg
5% Opfake
2% Smsreg
64% 2% Boxer
2% Smssend
2% Ginmaster
1% Other
1%

Figure 14. Top Android malware families in 2014, as detected by ReversingLabs

Notable Android of various system events that prevented


the user from launching any other app or
malware in 2014 terminating the malware.
Although some of the methods featured
The first ransomware, which belongs to the
here will not appear sophisticated compared
Android.Trojan.Tlock family, was discovered
to the methods used by Windows-based
in April and contained basic functionality
malware, most of them are new to Android,
for locking the screen and preventing the
especially considering the fact that the first
user from navigating away from it. The app
Android malware was only discovered a few
purported to be a free anti-malware app by
years ago.
Norton, but after presenting a fake
anti-malware user interface, it displayed a
Ransomware
warning that appeared to come from the FBI.
This year we have seen our first
purposefully made ransomware samples,
This technique is consistent with techniques
with functionality that prevented the users
used by some of the desktop-based malware
of infected devices from working. This was
families, such as Reveton or BrowserLock.
usually achieved by a combination of social
The Tlock family evolved over time and
engineering techniques used to convince
reached full ransomware functionality that
the user to allow a malicious app to obtain
included allowing the user to unlock the
device admin privilege (which is different
device by entering a valid MoneyPak voucher
from the user privileges granted to apps by
number into the application UI.
the underlying Linux kernel) and interception
Tlock was not the only Android ransomware accessing apps on the external memory
family in 2014. New families also included card in Android 4.4 (KitKat). The new access
Koler and Simplelocker. Simplelocker was permissions prevent third-party apps from
written for the Russian and Ukrainian writing outside their own directory, similar
markets and attempted to encrypt some file to how a sandbox prevents apps from
types on the external memory card using the accessing another application’s data on the
AES encryption algorithm with a hard-coded main internal memory card.
phrase to initialize the algorithm, which
allowed for easy recovery of encrypted data. However, even without the ability to encrypt
In addition to that, Simplelocker uses the documents, Android ransomware has the
TOR .onion domain for communications to its potential to prevent users from accessing
command-and-control (C&C) center, which their devices, simply by employing screen-
makes it the first Android malware to actively locking techniques.
use TOR.
This chart shows an increase in the number
One of the mitigation factors for apps of Android ransomware samples discovered
attempting to encrypt documents is monthly from the moment in April when the
Google’s introduction of constraints for first Android ransomware was discovered.

200

High
183
150

100

50

Low
0
0
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov

Figure 15. Number of Android ransomware samples discovered per month by ReversingLabs ;
note January-March absence
SMS malware However, it is more likely that the writers
One attack used Web injections Sending SMS messages to premium-line of SMS malware are simply regrouping
and social engineering to install numbers was the first payload used by and working on addressing those new
fake banking apps Android malware writers. This technique was rules. It is likely that we will continue to see
onto smartphones. particularly useful in Europe, where SMS still SMS Trojans, especially in Europe, in the
remains one of the more popular services foreseeable future.
allowing vendors to monetize their services
(it allows users to pay for small items, such as Banking Trojans
ringtones, by sending SMS messages). Banking Trojans became more prolific this
year, with several families designed to attack
The popularity of premium SMS services the transaction authorization system that
and instant payments to service providers uses mTANs sent to users’ smartphones over
in Europe provided malware writers with SMS. The Android.Trojan.Faketoken family
a platform that they successfully used to intercepts SMS messages from banks in
their financial benefit for several years. SMS order to forward them to locations controlled
malware usually pretended to be a game or by the attacker.
a similarly interesting app, but soon after
the user granted the app permission to send This attack was first employed in a mobile
SMS messages, it would start sending them component of the Zeus (Zitmo) family, which
to the premium lines, making users pay an coordinated attacks on users of Internet
unexpected price premium for what should banking by using Web injections and
have been free. social engineering to install fake banking
apps onto smartphones. Once a user
Opfake, Boxer, and Fakeinst are the most logged into Internet banking through the
common families in Android SMS malware. desktop browser, the desktop component
of Zeus (Zbot) would conduct a fraudulent
It is worth noting that most of the SMS transaction, often using an automated
Trojans target Russians and citizens of transaction system (ATS) built from the
other countries of the former Soviet Union. JavaScript code injected by Zbot.
However, the time of SMS Trojans may
be coming to an end. Kaspersky Labs The mobile component was essential for
researchers have attributed an increase intercepting and forwarding the mTAN
in the number of discovered Android SMS required to conclude the fraudulent
Trojans shortly before July to new rules transaction. Stealing and forwarding mTANs
introduced by the Russian telecom regulator is the most commonly seen function for
for services paid by SMS. These new rules mobile banking malware.
mean that the providers of SMS services now
need to send a confirmation code to users,
which must be confirmed by the user before
continuing on to use a premium line service.

symantec.com/connect/blogs/windows-
103 

malware-attempts-infect-android-devices.
A second common attack pattern, mostly Overall, 2014 was a significant year for
targeting Korean banks, is delivered as a fake mobile banking malware, but we have not
mobile banking app that attempts to replace yet seen it reaching the potential we have
existing mobile banking apps with malicious observed with Windows banking malware.
copies. One of the more interesting examples We will continue to carefully monitor the
was Android.Trojan.Gepaw, discovered in development of mobile banking malware
January. Gepaw was one of the first Android in 2015.
malware samples to be purposefully installed
by its Windows component if an Android
device was connected to a desktop.103

1,000

High
800 918

600

400

200
Low
41
0
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov

Figure 16. Number of Android banking Trojan samples discovered monthly during 2014 by
ReversingLabs

Conclusion ensure all systems are protected, regardless


of platform; though not a cure-all, anti-
The targets rise and fall, but the overall malware protections remain an effective
trend in volume is unambiguous: Malware defense, particularly against attacks aimed at
threats are more widespread and pernicious long-known vulnerabilities. Those ongoing
than ever. The creators of malware have efforts are the proper and measured
become smarter and more aggressive and response to those in the industry who seem
will continue to do so, both developing to dismiss the usefulness of anti-malware
new forms of attack and repurposing older protections. They won’t catch every attack by
approaches and known vulnerabilities. It modern malware, but they’ll miss 100 percent
continues to be critical for enterprises to of the threats they’re not deployed against.
Risks: Spotlight Hotels and Resorts lodging chain, for
instance, was breached three times in 2008

on privacy
and 2009, with under a million records
affected in total—hardly a blip on the radar
in 2014. However, a 2012 suit brought by
In the enterprise, risk is a broad security the Federal Trade Commission against
concept—it is evaluated and then managed, the company alleged that the chain made
remediated, reassigned, or simply accepted. multiple false claims in its privacy policy
But to many consumers and enterprises in about security measures in place to protect
2014, risk could be narrowed down to one consumer data, and that its failure to actually
question and one response: Is my private safeguard consumers’ information caused
information in danger of being exposed? substantial injury in violation of Section
Fix it! 5 of the FTC Act, which governs unfair or
deceptive practices.107 That case became
Though 2013 put high-level privacy issues Federal Trade Commission v. Wyndham
in the spotlight with Edward Snowden’s Worldwide Corp.108
surveillance disclosures, it was 2014—The
Year of the Data Breach,104, 105 with shops Wyndham argued that the FTC didn’t have
from Neiman Marcus to Goodwill in the the authority to set unfairness standards
spotlight—that truly drew the attention, for cybersecurity—and that it was the
and ire, of business and consumer alike. businesses (specifically banks and credit-
A landmark decision further ensured that card issuers) who pay to cover breach costs,
commercial enterprises must consider the not the consumers whose private information
confidentiality, integrity, and availability of is affected, who are actually harmed by such
user information—the three core tenets breaches.109 It also argued that the FTC must
of information privacy—in their issue regulations about cyber security before
security equations. making any claims about its fairness or
lack thereof.110
We’ll look more closely at the mechanics
of data breaches, specifically point-of-sale The ruling came back at the District level
breaches, later in this report. For now, in April, and the FTC won on all three
it’s worth noting that attackers tallied counts—a remarkable judicial affirmation
considerable data-breach totals in 2014, of the FTC’s role in enforcing data-security
with at least a dozen reported compromises standards in support of consumer privacy.111
affecting more than 10 million records apiece (The ruling is under appeal at the Circuit
and three—Home Depot, eBay, and a group level.) As other government agencies and
of South Korean financial entities—reporting legislative bodies struggle to address cyber
over 100 million affected records apiece.106 security—whether through frameworks
These numbers ignore both Target’s 110 (NIST)112 or procurement rules-making
104
t echrepublic.com/article/prevent-2015-from-
million-record breach, which may be said to (Department of Defense)113 or proposed
becoming-another-year-of-the-data-breach/. have kicked off the mayhem in December legislation (HR 5793)114—the FTC’s case
105
d arkreading.com/attacks-breaches/the-year- 2013, and the highly publicized “CyberVor” puts privacy firmly in the cyber security
of-the-retailer-data-breach/d/d-id/1317462.
incident, which likely overstated its claims to conversation. In the words of legal scholars
106
breachlevelindex.com/#!breach-database.
holding 1.2 billion records but raised privacy Woodrow Hartzog and Daniel Solove, “the
107
f tc.gov/news-events/press-releases/2012/06/
ftc-files-complaint-against-wyndham- and data security yet again as a topic of implications of this case could not be more
hotels-failure-protect.
wide concern. important for data security as well as
108
a shkansoltani.files.wordpress.com/2014/04/
ftc-v-wyndham-opinion.pdf. for privacy.”115
109
p rivacyassociation.org/news/a/
Of course, a larger breach may not affect all
ftc-v.-wyndham-round-one/. or even most of the users whose records it
110
a shkansoltani.files.wordpress.com/2014/04/ touches, and a breach of just a few records
ftc-v-wyndham-opinion.pdf.
can be disastrous if the right individuals’
111
p rivacyassociation.org/news/a/
the-wyndham-decision-where-does- information is obtained. The Wyndham
cybersecuirty-legislation-go-from-here/.
112
n ist.gov/cyberframework/upload/
cybersecurity-framework-021214-final.pdf.
113
e xecutivegov.com/2014/01/report-govcon-
procurement-cybersecurity-could-see-
changes-in-new-defense-policy-bill/.
114
c ongress.gov/bill/113th-congress/house-bi
ll/5793?q={%22search%22%3A[%22cyber
+security+chain+management%22]}.
115
d ocs.law.gwu.edu/facweb/dsolove/files/BNA%20
FTC%20v%20Wyndham%20FINAL.pdf.
Other types of privacy issues seemed to For enterprises—some feeling as helpless
Americans seem to be highly be of less concern in 2014, but regulatory as any consumer as they watch competitive
aware of privacy and data- and business activity continued. In Europe, data, confidential business plans, and
security issues, but they are privacy advocates successfully advanced executive emails make headlines—the
deeply pessimistic that they can the “right to be forgotten” by online current state of privacy presents the
do anything about them. search sites such as Google. That ruling, proverbial challenges and opportunities.
in Google Spain SL, Google Inc. v. Agencia The level of political and legislative activity
Espanola de Proteccion de Datos (Mario will inevitably continue to rise, with some
Costeja González), sounded somewhat efforts more appropriate than others.122 The
unusual to Americans accustomed to less international standard community is working
comprehensive privacy legislation, but well to move standards that will cover fields such
in line with European understanding of the as cloud computing.123 If the FTC does not
responsibilities of data processors.116 As ultimately prevail in its attempts to establish
Google and other search sites figure out its jurisdiction over security and privacy,
what compliance may entail, some observers it’s reasonable to expect that the current
suggest that “the right to be forgotten patchwork of federal and state regulations
everywhere”117—and the European Court of will expand. So will the need for enterprises
Justice’s rejection of the separate corporate to competitively track and manage
entity doctrine (which allows non-European changes125 and to find a way to cooperatively
companies to operate in Europe through address threats. Some observers see
subsidiaries while denying that European law opportunity afoot, with privacy-proactive
applies to the entire company)—may extend businesses offering transparency and
far beyond the original case. safety as a differentiator126 if not an outright
customer requirement.127
The Snowden revelations concerning data
surveillance seemed to lose their impact on Still, some issues can elicit an engaged
privacy-concerned consumers,118 and a few response. In particular, there appears to
other areas of traditional interests to privacy be growing consumer awareness about
mavens also found little purchase among privacy issues at the Internet of Things level,
civilians. An ineradicable “supercookie” whether that’s concern that one’s TV128 or
being deployed by Verizon drew remarkably thermostat129 is a security and privacy risk or
little concern beyond traditional privacy something more systemic. The mass theft
circles.119 A survey in November by Truven and online posting in summer 2014 of private
Health Analytics and NPR indicated that photos from hundreds of celebrity-owned
consumers have few concerns about privacy iPhones blurred the line between security
and electronic medical records, at least and privacy, as what first appeared to be an
as practiced by their own physicians.120 intrusion shaped up to be a bad combination
116
n atlawreview.com/article/article-29-working- In fact it’s possible, according to a Pew of poor password choice and inadvertent
party-agrees-right-to-be-forgotten-
guidance-following-may-2014-cj. Internet survey that promises to be the first saving of images to the cloud by users who
117
p rivacyassociation.org/news/a/the-right- in a yearlong series surveying consumer didn’t quite understand the implications
to-be-forgotten-everywhere/. attitudes to privacy that the Snowden of automatically doing so. In the long run
118
p ewinternet.org/2014/11/12/what-
americans-think-about-privacy/.
revelations have backfired on Americans in a these privacy breaches incrementally raise
119
eff.org/deeplinks/2014/11/verizon-x-uidh.
very particular way: They’re highly aware of user and enterprise awareness of good
120
t ruvenhealth.com/Portals/0/NPR-Truven-Health-
privacy and data-security issues, but they are security practices, but the combination of
Poll/NPRPulseDataPrivacy_Nov2014.pdf. deeply pessimistic that they can do anything big breaches and angry governmental cries
121
p ewinternet.org/2014/11/12/public- about them.121 to “fix it” will likely continue to be the privacy
privacy-perceptions/.
story in 2015.
122
t echdirt.com/articles/20141003/17382028725/
politicians-cynically-using-jp-morgan-hack-to-
try-to-pass-laws-to-diminish-your-privacy.shtml.
123
p rivacyassociation.org/news/a/one-stop-cloud-
compliance-how-the-isos-new-cloud-security-
standard-could-change-cloud-computing/.
124
p rivacyassociation.org/resources/article/full-
report-benchmarking-privacy-management-
and-investments-of-the-fortune-1000/.
125
a ssociationsnow.com/2014/09/how-can-retail-and-
financial-groups-prevent-another-target-breach/.
126
f ortune.com/2014/11/18/data-privacy-
competitive-differentiator/.
127
wired.com/2014/11/arab-spring-of-privacy/.
128
bgr.com/2014/10/31/smart-tv-privacy-and-security/.
129
u satoday.com/story/tech/2014/01/16/
google-acquires-nest-privacy/4518317/.
Exposures The second part of this section looks
at emerging technology and security
implications for the Internet of Things (IoT).
Emerging avenues for To a large degree, the security aspects
compromise: POS and IoT of the increasingly ubiquitous networked
computing we see in IoT technologies are
A number of different factors may arise and untested, but questions regarding the
lead to different types of security exposures. implications of increasing convergence
Novel technology can lead to exposures, abound. Key areas of concern are sensitive
as the implications of new technology can data leakage, confidentiality (such as those
sometimes be difficult to guess and avenues reported in a 2014 HPE wearable-devices
of attack can be unexpected until observed blog post130), and data integrity. We look at
in practice (reminding us that sometimes, we some of the issues around these pervasive
should think like an attacker).The following technologies and consider possible
section addresses and critically examines future trends.
some of the recent and emerging fronts in
the security wars.
The evolution of
First, let us look in detail at technical aspects POS malware
of one of the biggest security stories of
2014—the point of sale (POS) system In recent years, we’ve seen multiple POS
breaches at a number of major retailers in infiltration incidents, with particularly
the United States, most notably Target and high-profile breaches in 2013 and 2014
Home Depot. Both breaches resulted in at Target and Home Depot. In the Target
the compromise of millions of customers’ breach, the details of over 40 million credit
credit card and account details and were and debit cards and the information of 70
perpetrated using malware specifically million customers were stolen. In the case
created to target POS systems. This type of of Home Depot, 56 million credit and debit
malware has been seen in the wild for some card account details were taken. And these
years now, and in this section we track its are only the biggest incidents—there are
ongoing development by examining the undoubtedly more—both publically reported
evolution of three notable examples—Dexter, on and otherwise, but even these are two
BlackPOS, and Mozart. (Information on too many. The modus operandi used by the
additional POS-focused malware, Decebal attackers to capture financial information
and Back-off, can be found in the glossary.) in these breaches was POS malware.
POS malware is not new, but 2014 saw
Considering the sensitive financial data that considerable development in these malicious
is processed and used by POS systems, programs. They have evolved rapidly from
they are an obvious target for attackers. As being primitive and basic to advanced and
protections have increased at different points complex. In this section, we look at three
in the retail transaction process, particularly recent POS malware types in order to better
in the transportation and storage of financial understand the threat landscape in this
data, attackers have naturally looked to space and to examine how they are evolving.
other intersections for possible points of All three are somewhat notorious. The first
compromise—in this case, at the actual point is Dexter, which was discovered in the wild in
of sale. In the second part of this section, 2012. The second is BlackPOS, the malware
however, we will look at technologies where that was used for the Target breach, and the
an attacker’s path to monetization is l last is Mozart, which was used in the Home
ess obvious. Depot breach.

130
h 30507.www3.hp.com/t5/Applications-Services-
Blog/Wearable-Technology-and-the-challenge-
of-Fragmentation/ba-p/160704#.VIfDmE0cQ5s.
Capturing financial data: Process VirtualQueryEx API. This routine is common
enumeration and memory acquisition to many different POS malware types. Then,
In order to capture financial data, most after enumerating processes and virtual
POS malware uses a technique called RAM memory on the target machine, the POS
scraping. RAM scraping occurs when the malware uses the ReadProcessMemory API
malware enumerates the processes and to read the process memory.
virtual memory space of the target machine
looking for track 1 and track 2 data. (Track 1 Enumerating processes and virtual
and track 2 data is stored on the magnetic memory is a very common feature of POS
strip on the back of the card. It includes the malware. While special customized code is
account number associated with the card, not required for these tasks, for malware
its expiration date, and additional details analysts, the process and exclusion lists can
that determine how and which transactions provide clues as to which product line the
will be processed.) Process enumeration is malware may be targeting.
usually performed by the EnumProcesses
API or the CreateToolhelp32Snapshot and Getting on the right track: Track data
related APIs. Regardless of this difference, location methods
the two methods function in the same way. At this stage in the process, our example
malware types diverge, and each uses a
In order to limit the amount of enumeration different approach to find the valuable track
that is required to capture data, POS malware 1 and 2 data in the information that’s been
may use different techniques for selecting scraped from memory. While older POS
which processes to target. Looking at our malware (such as vSkimmer) often used
case studies,131 BlackPOS, for example, only regular expressions to search for track 1
scans a process named “pos.exe.” This is and track 2 patterns, this can be very CPU-
notable, as it implies that the authors of the intensive. Considering that POS machines
malware had previous knowledge of the have limited CPU and memory resources,
environment in which the malware would be better methods were required. Thus more
run. The malware authors also save the “pos. recent POS malware tends to use custom
exe” string in encoded form in the binary, so track search routines.
that the process being targeted isn’t obvious
upon casual inspection of the executable. Dexter
In contrast, Mozart and other POS malware The search routine used in Dexter is simple
types use a blacklist approach. Blacklisting and only recognizes track 2 records. The
excludes common process names from the recognition of the track 2 pattern starts
scanning process. This approach is more by locating the track 2 separator (denoted
generic, as the malware can then be used for by “=”) and then checking for numeric
different POS systems using different process characters before and after the
names. Many POS systems still use Windows separator character.
XP machines, which have limited CPU and
memory capacity, so saving resources by BlackPOS
more effectively targeting relevant BlackPOS searches for both track 1 and track
processes is an essential feature of 2 patterns. It checks if the current byte is
modern POS malware. either the track 1 separator (denoted by “^”)
or the track 2 separator (denoted by “=”). If
After locating the processes to scan, the it matches the pattern, it checks the length
POS malware queries the virtual memory of numeric characters that come before the
list allocated on the target process using the separator in order to further validate that this
is the correct data.

131
h 30499.www3.hp.com/t5/HP-Security-
Research-Blog/Hacking-POS-Terminal-for-
Fun-and-Non-profit/ba-p/6540620.
Mozart like Dexter uses a simple function, StrStrA,
The Mozart track 1 and track 2 data to find duplicate track records: A binary tree
recognition routine is more sophisticated data structure is a lot faster than just using
than that used by the other POS malware. a StrStrA string matching function when it
Of note, it does not buffer any data before comes to performance.
attempting to match track separators. While
malware such as BlackPOS buffers data and Interestingly, while Mozart was responsible
uses CPU cycles to find possible number for the theft of 56 million credit and debit
patterns, Mozart checks the validity of card numbers, it doesn’t contain any data
track 1 and 2 data heuristically after it finds management functionality; it simply saves
the track separators. Mozart is also able every track entry it encounters while RAM
to recognize a broader range of character scraping.
types in both data tracks than our other two
examples, making it not only more efficient Data exfiltration
computationally, but giving it a broader Once the financial data is captured, it needs
application and possibly higher success rate. to be transported from the affected system
so it can be sold or otherwise used for fraud.
Mozart also uses some additional verification Usually, this step of data exfiltration is not
mechanisms of interest. It checks the card directly performed by the POS malware. As
issuer identification number after it gathers with other modern malware, POS malware
possible track records, then it utilizes the is often modular and while it performs RAM
Luhn algorithm132 to check that the numbers scraping and saves the data to a log file
it captured were potentially valid card on a local system or remote UNC location,
numbers. Not only does this effort decrease different modules are responsible for
the number of false positives, it decreases uploading those log files to the attacker. That
the size of the log file. setup is common and was used in recently
reported breaches, including those at Target
Track data management and Home Depot.
While Mozart might be the best example of
efficient targeting of track data, BlackPOS Both Mozart and BlackPOS use very similar
stands out for its track data management. schemes for uploading log files. They both
Many POS malware types simply save the use a specific time frame to initiate a network
track records they capture direct to the file operation to copy the files when the traffic
system. However, BlackPOS maintains a will look least suspicious, and they both use
binary tree data structure of the track record Windows sharing to push the log files to
in memory so that it can quickly check if a central location inside the compromised
the record has been collected previously. network. The most likely reason for this
This has a few advantages. By removing is that the infected POS machine itself
duplicate records, it can reduce the size might not have an Internet connection;
of the track record log file. With a smaller therefore, the data needs to be transported
footprint on the network, it has a better to a location that does. From there, another
chance to avoid detection. Storage is usually component pushes the data outside of the
minimal on POS systems and by saving on network to machines under the attacker’s
local hard disk storage, BlackPOS can save control. BlackPOS is known to use an FTP
more track records. In contrast, POS malware program to upload its log files.

132
c reditcards.com/credit-card-news/luhn-formula-
credit-card-number-system-1273.php.
Defenses against POS malware groups. Of course, some features, such as
Using regular expressions is The following lists a number of steps that track record management are also different
resource-intensive. It makes the businesses using POS systems can take to for each case. The most notable difference
scanning process slow and may reduce the risk of being compromised by between them, however, is the track record
affect the overall performance of POS malware: recognition routines. Each malware uses its
the POS machine itself, making own method for locating track records and
• Use multi-factor authentication; this will
detection more likely. regardless of differences, the custom code
substantially increase the difficulty required
they contain is much more advanced than
to use compromised credentials
that of older POS malware families that use
• Segment the network regular expressions for this purpose. Using
regular expressions is resource-intensive. It
• Limit allowed protocols
makes the scanning process slow and may
• Limit user privileges affect the overall performance of the POS
machine itself, making detection more likely
• Initially monitor the addition of new users,
as administrators investigate the source of
particularly privileged users
the slowdown. Also, as RAM scraping is all
• Monitor for excessive and abnormal about timing—when a customer swipes the
LDAP (Lightweight Directory Access credit card it is passed to the POS process,
Protocol) queries but there is no guarantee on how long the
data will be intact in process memory. Finally,
• Use application whitelisting on sensitive
the faster you finish one loop of scanning,
servers (those that are used for
the greater the chances of catching new
critical functions)
track records.
• Heavily secure and monitor
Active Directory Our final takeaway though, regarding
BlackPOS and Mozart in particular, is that
• Migrate to an EMV Chip-and-Pin point of
they look customized—that is, they look
sale system, which makes cloning credit
as though they were developed for these
cards nearly impossible
specific breaches. BlackPOS contains an
encoded form of a targeted POS process
By looking at the POS malware responsible
name, which might be specific to Target’s
for some of the recent big breaches, we’ve
POS environment. BlackPOS and Mozart also
discovered that while they share a number
have hardcoded server IP addresses to which
of similar features, they do not appear to
they push the log files of captured data. This
share the same code base. Simply put,
tells us that these POS malware programs
the functionality is similar but the code is
were built by people who knew the
different, which suggests that they were
targeted environments.
developed independently by different
The Internet of Things Understandably, the diverse and ubiquitous
nature of the technology and devices that
While the “Internet of Things” (IoT) might comprise the IoT gives rise to concerns
just seem like one of the latest catchphrases, regarding security and privacy in particular.
it is an important paradigm in computing The coming level of interconnectivity,
and communications that is likely to have combined with exponentially more data
profound effects for security. In the IoT, the capture and storage, is unprecedented; in
objects we use in the physical world are order for systems to respond appropriately
identified, labeled, and interconnected. While to changing conditions, they must take
the technology for object connectivity has accurate and ongoing measurements
been around for some time, a confluence of their environment and the system or
of additional factors has contributed to endpoint they are monitoring (even if that
the current development of IoT, including endpoint is a person). What is thought to be
significantly cheaper storage, advances in Big appropriate access to and use of this data is
Data processing, and connectivity chipsets. yet to be determined, but there are multiple
The IoT enables these objects to not only dimensions that need to be considered.
communicate intelligently together, but also Also, as the IoT brings the physical and the
to monitor, measure, and act in response virtual world together, the consequences
to changing environmental conditions, of unethical or malicious use become
leading to greater efficiencies in all manner increasingly “real”—what if an attacker
of applications, from remote healthcare, to hacked your car, or even your pacemaker?
industrial systems, to avoiding having your
fridge run out of milk. The IoT is where the
physical world meets the virtual in practice.

Developers globally who are Developers planning work

17 % working on applications
targeting connected devices. 23 % on connected devices within
the next six months.

Figure 17. Evans Data Corporation global survey of developers, conducted in spring 2014133

A spring 2014 Evans Data survey showed TV with surprising results. Read the blog138
that 17 percent of developers globally were for details.)
working to develop applications targeting
connected devices for the IoT and that 23 The explosive growth of IoT technologies
percent are planning to do the same in is not accidental and is the result of the
the next six months or so.134 Even though convergence of several technologies,
Internet-connected devices have existed for including broadband and Big Data
some time, it seems that the acquisition of processing and acquisition. The burgeoning
Nest Labs, the connected-devices company field of data collection and processing is
(and creator of the Nest learning thermostat), tightly intertwined with that of IoT and the
by Google for $3.2 billion marked a turning two areas otherwise fuel each other’s growth.
point in the market, firmly focusing attention
on IoT.135 Several other important acquisitions The IoT normally implies interconnected
soon followed, such as SmartThings by hardware nodes. These hardware endpoints
Samsung136 and Dropcam by Google,137 collect information about the environment
showing that momentum is continuing to and respond to the control functions of a
build in the IoT industry and that growth is user. These nodes could be part of a larger
accelerating. (Our researchers spent some electrical device or could act as
133
evansdata.com/press/viewRelease.php?reportID=38. time in 2014 hacking a Samsung Smart IoT standalone units.
134
evansdata.com/press/viewRelease.php?pressID=212.
135
investor.google.com/releases/2014/0113.html.
136
samsung.com/us/news/23607.
137
r euters.com/article/2014/06/22/us-google-
nest-dropcam-idUSKBN0EW02820140622.
138
h 30499.www3.hp.com/t5/HP-Security-Research-
Blog/How-I-learned-to-hack-my-TV-and-
started-worrying-about-the/ba-p/6383829.
The endpoint wireless infrastructure is proprietary systems based on Linux or other
still in its infancy, and unfortunately a lack popular OSes; Bosch is the driving force
of collaboration in the industry during behind the idea of developing a universal
its development failed to create an open and open-source smart model.
ecosystem that would accommodate
heterogeneous devices and communication The IoT continues to grow. It continues to
protocols. The lack of common interface capitalize on new opportunities in areas
solutions and security standards has led such as sensor monitoring in traffic, railways,
to proprietary implementations of protocol car-parks, the home, the local power grid,
stacks and firmware updates, and as a result, embedded medical devices (including
has significantly expanded the surface for wearable sensors), and computing. The
malicious attacks and vulnerabilities. areas for these applications include industrial
robotics, automotive, factory automation,
At its core, an end-node device normally home security, agriculture, and more.
consists of a CPU (central processing According to a Gartner projection made at
unit, which acts as a control unit), sensors, the end of 2013, the number of connected
input and output modules, and a network devices (excluding PCs, smartphones, and
processor together with either a wired or tablets) is estimated to be around 26 billion
wireless network front end. Many functions in 2020. This, according to their projections,
are often combined within a single integrated will far exceed the number of PCs, tablets,
chip (IC) solution. and smartphones (which is estimated to be
around 7.3 billion units in 2020).140 Over the
The majority of current market solutions tend next few years more devices will incorporate
to employ MIPS- or ARM-based chipsets and multiple types of wireless connectivity,
to run flavors of Linux. This feature was most including Wi-Fi, ZigBee, Z-Wave, MiWi, and
probably dictated by the availability of ready- other proprietary protocols. Also, to satisfy
made development solutions and tool chains the demand for micro power and always-on
(groups of programming tools that are used connected sensors, and to simplify non-
in series to create a product), which were interactive automation nodes, there are many
adopted from set-top boxes, routers, and low-power, low-cost Wi-Fi and processing
NAS (network-attached storage) devices. modules fast coming to market.

For example, a first-generation Nest There seem to be two large groups of


thermostat uses an AM3703 Sitara hardware platforms targeting the various
processor139 from Texas Instruments. The fields of IoT. The first group can run any
thermostat is based on the ARM Cortex™-A8 sort of Linux or Windows embedded
architecture. The development tools include OS. The second group consists of less
the Linux EZ Software development kit computationally intensive and power-hungry
and the Android Development Kit for processors that are aimed at proprietary
Sitara Microprocessors. Both packages are or open-source real-time operating
available for download from the TI website systems with a small memory footprint
and are free of charge. These freely available (for example RTOS, Micrium uC/OS-II, uC/
development tool chains based on popular OS-III, or TI-RTOS-KERNEL). This second
OSes, combined with relatively lower rates group is even more fragmented and tends
of power consumption, made this a lucrative to rely on proprietary software stacks and
processor for the IoT market. The first- integrated development environments.
generation Nest OS is based on Linux 2.6.37 There is an effort to bring homogeneity
and uses other free software components. to the IoT ecosystem that is being driven
The firmware image is locked so it only by the ARM consortium and its partners
accepts signed firmware updates. Nest also with the development of an event-driven
provides unlocked firmware so it can accept MBed OS specifically targeting low-power
unsigned firmware images. This allowed a devices within the IoT realm. The solution
third party to re-implement the basic logic rests on three pillars: as the MBed OS itself,
of the thermostat as an open source project the MBed device server (which acts as an
called FreeAbode. MBed-powered IoT devices cloud aggregator
and a portal for Internet applications), and a
Big appliance manufacturers, such as suite of MBed tools aimed at simplifying the
Samsung, GE, Whirlpool, and Bosch, are development effort from the ground up to
139
ti.com/product/am3703. likely to follow this trend. Many also use fully designed solutions. Most importantly,
140
gartner.com/newsroom/id/2636073.
these solutions are open source and The current lineup of developing frameworks
attractive to a large proportion of makers shows that possible solutions are likely to
and the developer community. congregate around integrated and self-
contained Wi-Fi modules connected to a host
There’s an ongoing effort to engage processor. Such modules will either offload
developer communities to participate in networking services from a host controller,
creating hardware, software, and firmware or will be capable of carrying application
solutions covering network-connected, software on the network processor itself.
embedded, and deeply embedded devices. These Wi-Fi modules are also likely to run a
This of course is not limited only to hardware flavor of the Linux OS and its TCP/IP stack or
and firmware. The software includes another third-party OS, and to rely on lwIP
developing services, cloud solutions, and Big (lightweight IP) or their own TCP/IP stack
Data analytical and aggregating platforms. (often royalty-free with the use of proprietary
The industry, taught by the experiences chipsets such as Microchip and TI). The
of companies like Apple and Google, Wi-Fi module network processors, as well as
understands that a competitive advantage host device processors, will gravitate toward
lies with ease of development and an a balance of computational power and the
abundance of applications. This will drive the ability to sustain lower power consumption.
development of frameworks and standards This is especially important for “always-on”
even further. devices with lower connectivity bandwidth
such as ambient light sensors, temperature
On the hardware end of things the same and humidity sensors, and so on.
methodology persists. Success lies in
targeting a broad community of makers, With the sector rapidly expanding and
including those who are not entirely skilled in so many alternative solutions rushed to
electronic design or engineering. This implies the market by different manufacturers,
modular hardware design with most of the we should expect to experience further
functionality embedded into ICs. It gives rise market fragmentation and a bigger variety
to a prevalence of system on integrated chip of frameworks and available solutions.
solutions (SoIC), which simplifies hardware The initiative is there to introduce a
design and connectivity but unfortunately, common open-source framework, including
due to proprietary firmware solutions and a connectivity layers as well as development
lack of unified interface protocols, increases tool chains and software (for example, MBed,
solution fragmentation even further. OpenIoT, or IoTSyS). This shows that popular
IoT devices are most likely to run an open
Major chip manufacturers, realizing the source OS such as AllJoyn, which was initially
need for SoIC that target the lower and developed by Qualcomm but is currently
middle end of IoT devices, are bringing sponsored by the AllSeen Alliance. This is
comprehensive firmware and integrated the most prominent OS and thus likely to be
development environment solutions to accepted as an industry standard because it
market. One popular approach is to separate is cross-platform and has APIs for Android,
the logic of the TCP/IP stack and Wi-Fi radios iOS, OS X, Linux, and Windows. It also
from a connected device. There are many includes a framework and a set of services
manufacturers racing to compete in the fast that will allow manufacturers to create
growing IoT chipset and Wi-Fi modules field. compatible devices. Other operating systems
Manufacturers to note include Microchip, worth mentioning are Contiki, RaspbianPi
STMicroelectronics, Texas Instruments, (based on a Debian distribution of Linux),
Freescale Semiconductor, Broadcom, RIOT, and Spark.
Qualcomm Atheros, Nordic Semiconductor,
Atmel, and others.
Conclusion The final section of our report brings us full
The availability of open-source circle and to one of the most important parts
solutions might act as a double- Despite many efforts to abstract and of this publication—controls. It answers the
edged sword for discovering and universalize the IoT framework there remain important question of why vulnerabilities
mitigating vulnerabilities. multiple actors and competing solutions in arise and shows a very different view of the
the market today, and the fragmentation threat landscape. Being aware of the specific
of solutions and devices discussed in this circumstances that give rise to vulnerabilities
section is likely to continue. Addressing lets security practitioners address their root
security concerns such as attack vectors on causes and make enterprises, not to mention
such devices is likely to require individual your coding practices and software selection,
solutions for each type and family of considerably more secure.
device—an extremely difficult situation. The
limit on the number of possible “over the
air” or “in service” upgrade-capable devices,
especially in the lower-end cheap sensor
segment, is likely to make mitigating such
Controls
attacks even more difficult. In the past year we have seen the
manifestation of several vulnerabilities that
Attacks could involve various layers of the gathered a storm of media attention. The
device infrastructure. This could include uproar around Heartbleed, Shellshock,
applications running on smartphones and Poodle brought renewed scrutiny to
or tablets, cloud services—including software dependencies as they relate to
firmware and network service stacks on software architecture. We noted new trends
Wi-Fi modules—as well as the firmware in where vulnerabilities are detected, as
and application layer on the host processor. well as continued shifts in the types of
Various vectors of propagation could also be weaknesses leading to them. To gain insight
used, including compromising update files into the current state of software security,
or exploiting network and host processor we analyzed a sample set of security audits
communication layer vulnerabilities, as performed by HPE Fortify on Demand on
well as possible vulnerabilities in cloud 378 mobile apps, 6504 Web apps, and 138
service infrastructures and smart device Sonatype reports from 113 projects. These
applications. The availability of open-source audits include results from static, dynamic,
solutions might act as a double-edged sword and manual analysis.
for discovering and mitigating vulnerabilities.
On one hand, common source is likely to In order to have a consistent view of the
be susceptible to the same vulnerability data analyzed for this Report, we’ve ensured
across a span of many devices, but on that all identified issues were classified
the other hand it will allow the broader according to the HPE Software Security
community to discover, test, and mitigate Taxonomy (originally the “Seven Pernicious
vulnerabilities earlier, provided the firmware Kingdoms”), which was substantially updated
and software can be updated in a timely and refined141 in mid-2014. These updates
manner. Unfortunately in the case of many and refinements are reflected in HPE
of the simpler IoT devices, this just might not WebInspect, our dynamic analyzer. Our work
be possible—at least initially. There are still to extend the taxonomy to other assessment
a number of unknowns when it comes to the techniques (such as manual analysis) and
security of the IoT in practice. HPE Fortify products (such as HPE Fortify
on Demand) continues in 2015.

141
gartner.com/newsroom/id/2636073.
Distribution by kingdom kingdoms discovered in applications, and
especially how those change over time. The
The HPE Software Security Taxonomy following graph compares the distribution of
is organized into kingdoms, which are vulnerabilities discovered in Web applications
collections of vulnerability categories across kingdoms in 2014 (using a sample size
that share a common theme. One of the of over 6,500 apps) against those spotted
metrics that gives us more insight into in 2013 (using a sample size of over
vulnerability trends is the distribution of 2,200 apps).

2014
rank Kingdom 2013 percentages 2014 percentages

1 Security features 72% 86%

2 Environment 80% 82%

3 Encapsulation 56% 72%

Input validation
4 and representation
53% 52%

5 Errors 31% 47%

6 Time and state 8% 22%

7 Code quality 16% 17%

8 API abuse 2% 16%

Figure 18. Web app vulnerability category distributions by kingdom in 2013 and 2014

In general, in 2014 more Web applications personal health information (Los Angeles
contained vulnerabilities in each kingdom Department of Health Services146).
than they did last year, with the exception
of Input Validation and Representation The same rise in breach reports explains
kingdom (which decreased by just 1 percent). jumps in other kingdoms. The percentage of
applications that have API Abuse problems,
In 2013, Environment was the kingdom many of which are related to misuse of
represented in the greatest percentage of SSL certificates, jumped from 2 percent
applications (80 percent), while Security to 16 percent. The percentage for the
Features took second place with 72 percent. Encapsulation kingdom, whose categories
This year the two kingdoms switched places. delineate ways in which an application might
Even though the percentage of applications leak system data to a potential attacker
that contained Environment issues stayed who can use this information to mount a
relatively similar between 2013 and 2014 (80 bigger attack on the system, went up by 16
percent vs. 82 percent), the percentage of percent (from 56 percent to 72 percent). The
applications that contain problems related to Errors kingdom, whose categories are very
Security Features—including access control, much related to leaking system information
privacy violation, password management, in the form of error messages resulting
insecure transport, and security of from improperly handled exceptions,
cryptographic primitives—jumped from exhibited a similar jump from 32 percent
142
gibsonsec.org/snapchat/fulldisclosure/. 72 percent in 2013 to 86 percent in 2014. to 47 percent. And many of the categories
143
umd.edu/datasecurity/. Unfortunately, this statistic is once again in Time and State kingdom that relate to
144
n eimanmarcus.com/NM/Security- consistent with the recent rash of privacy improper session and account management
Info/cat49570732/c.cat. and confidentiality breaches, ranging from contributed to the increase in the percentage
145
b its.blogs.nytimes.com/2014/09/18/
home-depot-says-data-from-56-million-
stolen personal data (Snapchat,142 University of applications susceptible to such problems,
cards-taken-in-breach/?_r=0. of Maryland143), to credit card numbers from 8 percent to 22 percent.
146
h ealthitsecurity.com/2014/03/07/los-angeles- (Neiman Marcus,144 Home Depot145), to
county-dhs-reveals-168000-patient-data-breach/.
The jump in the percentage for the Time In addition to including the results of
and State kingdom can also be attributed manual assessments in our analysis of Web
to the manual assessment findings, which application vulnerabilities, this year we also
were included in our dataset this year for the performed the same analysis on mobile
first time. Session and account management applications. The following graph represents
defects are more similar to design flaws, and the distribution of kingdoms discovered in
therefore are hard to detect using automated both mobile and Web application datasets
techniques. However, they are still important that were assessed using static, dynamic, and
to find and fix, and thus they inspire security manual techniques.
practitioners to explore ways other than
manual assessment—a cumbersome and
error-prone process—for spotting
design-level security concerns.
Web Mobile
app rank app rank
13% Mobile apps
8 7 API abuse
16% Web apps

38%
7 5 Code quality
17%

80%
3 2 Encapsulation
72%

70%
2 3 Environment
82%

8%
5 8 Errors
47%

Input validation 48%


4 4 and representation 52%

97%
1 1 Security features
86%

26%
6 6 Time and state
22%
0% 20% 40% 60% 80% 100%

Figure 19. Web app and mobile app vulnerability category distribution by kingdom in 2014

It is clear from Figure 19 that the Security While the numbers for the API Abuse, Input
Features kingdom takes first place not just Validation and Representation, and Time
for Web applications, but also for mobile and State kingdoms are similar between
applications. Furthermore, the percentage mobile and Web applications, the Code
of mobile applications that contain Security Quality and Errors kingdoms both exhibit
Features issues (97 percent) is higher than drastic differences, and the numbers for the
that of Web applications (86 percent). There Encapsulation and Environment kingdoms
are at least two factors which contribute to are basically reversed.
this finding. First, there are far fewer options
for securely storing sensitive information on Let’s start by looking at similarities. As
mobile devices, fewer choices of encrypted mentioned above, many of the API Abuse
databases, and questionable mechanisms problems are about misuse of certificates,
for storing cryptographic keys used for which equally applies to both mobile and
protecting this data. Second, the very nature Web applications. The same goes for
of mobile application development requires session and account management flaws in
developers to use security features, such as the Time and State kingdom. Categories of
Android permissions or iOS data protection vulnerabilities stemming from inadequate
that they may not fully comprehend. This input validation and encoding are similar for
lack of clarity eventually leads to misuse. both Web and mobile applications, and the
fact that the percentages of applications As for the differences in Code Quality
that contain such issues is nearly the same numbers, our data indicates that a much
is indicative of the fact that developers with higher percentage of mobile applications—
similar skillsets write code for both mobile compared to Web applications—contains
and Web applications, and thus make the instances of null dereferences. The ability
same kinds of mistakes. of mobile applications to communicate with
each other is one of the reasons behind
It is interesting that the numbers for the this. In the mobile world, developers do
Environment and Encapsulation kingdoms not always check the data coming from
are reversed, but this can be easily explained another application against null, because a
as well. One of the biggest differentiators lot of the time they are expecting the data
of the mobile ecosystem, compared to Web to be coming from another component of
applications, is the fact that different mobile the same application (rather than from an
applications run side by side on the same entirely different app) and thus assume they
device within the same environment and can trust it to be in the expected format.
are able to communicate with each other. Second, our mobile application dataset
Therefore, there are more opportunities includes both Android and iOS applications.
for data to cross trust boundaries in Many of the Code Quality issues are related
mobile applications, which explains the to C- (and therefore iOS-) specific problems,
higher percentage of mobile applications such as type mismatches, which simply don’t
that contain Encapsulation issues (80 exist in Web applications. This explains why
percent vs. 72 percent). On the other hand, the percentage of mobile applications (38
there are a lot more ways to deploy Web percent) that contain Code Quality issues
applications, a lot more Web servers to is higher than that of Web applications
run the applications on, and a lot more (17 percent).
opportunity for misconfiguration, which
is why Web applications (82 percent) are
more susceptible to Environment issues Breakdown of top five Web
than mobile applications are (70 percent). application vulnerabilities
This also explains why the number of Web
applications that contain defects in the At a high level, all vulnerabilities can be
Errors kingdom is much higher than that represented within a category of the
of mobile applications (47 percent vs. 8 HPE Software Security Taxonomy. Some
percent), because many of the categories in categories can be solely represented by
the Errors kingdom are about misconfiguring a single vulnerability (e.g., cross-frame
an application or a Web server in terms of scripting), while others could be a grouping
handling exceptions or providing a custom of multiple vulnerabilities (e.g., Web server
error page. misconfiguration). Below is a quick look at
five categories that affected the greatest
number of applications.
80%

70% 68%

60%
60% 58%
53%
48%
50%

40%

30%

20%

10%

0%
Web server Cookie security System Privacy violation Cross-frame
misconfiguration information leak scripting

Figure 20. Top five vulnerability categories across applications evaluated in 2014
Cookie security and system information performed a detailed analysis of defenses
leakage continue to be prominent issues against cross-frame scripting. Two years later,
when compared to 2013’s trends. Due to HPSR continues to find this to be a prevalent
recent changes to the HPE Software Security issue across Web applications.
Taxonomy, access control issues have now
been merged into the greater Web Server
Misconfiguration group. With this in mind, Top 10 Web application
misconfiguration issues gained the top vulnerabilities
spot based on 2014 data. Interestingly,
Transport Layer Protection (now called Each category within the taxonomy may
Insecure Transport) and Cross-Site Scripting be further refined based on specific
moved down to seventh and eighth places characteristics of the vulnerability. The chart
respectively. These were replaced by Privacy below represents the most prevalent Web
Violation and Cross-Frame Scripting. The application vulnerabilities seen in 2014.
HPE Cyber Risk Report released in 2013

Cross-frame scripting 48%

Web server misconfiguration: Unprotected file 47%

Privacy violation: Autocomplete 46%

Web server misconfiguration: Unprotected directory 46%

Cookie security: HTTPOnly not set 45%

Cookie security: Not sent over SSL 40%

Poor error handling: Server message 40%

Hidden field 38%

Cross-site scripting: Reflected 37%

System information leak: Filename found in comment 33%


0% 10% 20% 30% 40% 50%

Figure 21. Top 10 common vulnerabilities discovered in Web applications in 2014

It is interesting to note that nine of the top 10 the above chart, we can see that cross-frame
vulnerabilities are represented within the top scripting affects the most applications.
five categories shown in Figure 20. Based on
Because more attention is paid to critical Below is the representation of the subset of
issues, we decided to create a view of top 10 the vulnerabilities of critical risk found in Web
critical issues that plague Web applications. applications and their prevalence.

Cross-frame scripting: Reflected 33%

Often misused: Login form 18%

Cross-frame scripting 17%

Credential management: Sensitive information in URL 15%

Null dereference 13%

Unreleased resource: Streams 10%

Password management: Weak policy enforcement 10%

XML internal entity injection 10%

Privacy violation 9%

Insecure transport: Weak SSL cipher 9%


0% 5% 10% 15% 20% 25% 30% 35%

Figure 22. Top 10 critical vulnerabilities noted in Web applications in 2014

While there is no surprise that Cross-Site is the number-one issue across all analyzed
scripting: Reflected is the top critical concern applications within this category.
affecting most Web applications, it is notable
to see various authentication-related Looking deeper into the breakdown,
vulnerabilities in the top 10. Erroneous access to unnecessary files and directories
implementation or configuration of login seems to dominate the misconfiguration-
forms, credentials, passwords, and secure related issues. In comparison to the top 10
transport may provide the right ingredients common vulnerabilities shown in Figure
for privilege escalation. 21, Unprotected File and Directory are
the second and fourth most pervasive,
The trend with server misconfigurations affecting 46.86 percent and 45.63 percent of
seems to be very similar to last year, and it applications respectively.
Breakdown of the top of information that is trusted on mobile
devices creates some unique attack vectors
five mobile application as well. Mobile devices contain sensors and
vulnerabilities actuators of types not historically common in
personal computers or servers, which collect
Let’s discuss the more general or aggregated and transmit private information about the
trends in vulnerabilities observed this year user of the device. The list of sensors that
before we review more specific trends. can reveal sensitive information include
cameras, microphones, accelerometers,
Mobile application vulnerabilities continue gravity sensors, rotational vector sensors,
to evolve as the platforms become attractive gyroscopes, magnetometer, global
targets for application developers. Due positioning system (GPS) sensors, near-field
to the nature of mobile devices, their communication (NFC), light sensors, M7
vulnerability surfaces share some attributes tracking chips, barometers, thermometers,
with traditional client/server applications pedometers, heart-rate monitors, and
and Web applications. However, the type fingerprint sensors.

80%
74%
71%
70% 66%
62%
60%

50% 47%

40%

30%

20%

10%

0%
Privacy Insecure Insecure Insecure Poor logging
violation storage transport deployment practice

Figure 23. Top five mobile vulnerabilities noted in 2014, aggregated by category

In contrast to the top five aggregated violation categories observed in the sample
vulnerabilities found in Web applications, population. The potential for disclosing
mobile apps have four completely different geolocation information was the most
categories, with only Privacy Violation in common, found in 31 percent of all mobile
common. While Privacy Violation was the applications in the study.
fourth most common vulnerability observed
in the Web applications we analyzed (52.91 Part of securing sensitive information on
percent), it takes the top spot in mobile apps mobile devices involves ensuring that
(73.54 percent). Mobile applications are the data is stored in such a way that it is
unique in that they have access to a wealth adequately protected. Insecure Storage
of personal information from the array of weaknesses, which take the second spot
sensors built into modern mobile devices. (70.63 percent), are introduced into mobile
Furthermore, privacy violation weaknesses applications through either the misuse of
occurring on mobile devices can lead to the APIs, which are provided to help ensure the
disclosure of location, sensitive images, data protection of data using encryption schemes,
entered from the keyboard or displayed on or through their lack of use. On Android
the screen, and other personal information. devices, this can take the form of data being
In total, there were 15 specific privacy written to external storage (including backup
storage) without the use of encryption, or in unnecessary weaknesses. For mobile apps
of making data stored on internal storage this may include not using features such as
world readable or writeable. For iOS devices, PlayReady DRM, not checking to determine
a data protection API is provided that if the app is running on a jailbroken device,
uses hardware encryption to protect data; or exhibiting properties that may indicate
however, without proper understanding of malicious intent.
the various levels of data protection and
what they apply to, developers easily can Rounding out our top five, Poor Logging
make mistakes that leave the data vulnerable. Practice weaknesses were found in 46.56
percent of the mobile applications. The
While smartphones can be used for viewing, use of standard output often indicates that
manipulating, and storing local data, these the application is using standard output
devices also free users to interact with a for debugging and logging rather than
world of interconnected resources from structured logging facilities such as android.
the convenience of their hands. Through util.Log for Android, or the use of NSLog in
communication protocols, both sensitive iOS. Because standard outputs, and logs, can
and benign data is shared between remote be read by third parties, developers should
services and our devices. The third most always be cognizant of the risks associated
common aggregate vulnerability category with any sensitive information being written.
is Insecure Transport (66.14 percent), which
identifies weaknesses caused by the use of
communication protocols that do not protect Top 10 mobile application
sensitive data through encryption (such as vulnerabilities
HTTP instead of HTTPS) or that make use
of less secure protocol options. As shown for Web applications, each
category within the taxonomy can be further
Taking the fourth spot, Insecure Deployment refined into more specific vulnerabilities. The
weaknesses were identified in 61.64 percent following chart depicts the vulnerabilities
of the mobile applications studied. Insecure observed with the highest frequency in the
Deployment combines various deployment sample population of mobile applications.
configurations, settings, and states that result

Insecure storage: Insufficient data protection 54%

Poor logging practice: Use of a system output stream 47%

Weak cryptographic hash 43%

Insecure deployment: Missing jailbreak detection 37%

Insecure deployment: Known mobile attack surface fingerprint 34%

Web server misconfiguration: Information disclosure 33%

Insecure transport 32%

Privacy violation: Geolocation 31%

Null dereference 30%

Insecure transport: Defeatable certificate pinning 29%


0% 10% 20% 30% 40% 50% 60%

Figure 24. The 10 most common vulnerabilities noted in mobile apps in 2014
While Privacy Violation was the most Web Server Misconfiguration: Information
prevalent aggregated category, Insecure Disclosure (33 percent), and Null Dereference
Storage: Insufficient Data Protection (54 (30 percent). Most developers tend to pay
percent) was the most commonly observed attention to the most critical vulnerabilities.
vulnerability overall. In addition, all of The following chart represents a subset
the top 10 common vulnerabilities above of the vulnerabilities considered to pose
are captured by the top five, except for considerable risk that were found in the
Weak Cryptographic Hash (43 percent), mobile applications.

Insecure transport 24%

Null dereference 21%

Unreleased resource: Streams 18%

Insecure transport: HTTP GET 17%

Insecure storage: Lacking data protection 16%

Insecure storage: Insufficient data protection 16%

Privacy violation: Screen caching 14%

Privacy violation 13%

Privilege management: Unnecessary permissions 11%

Privilege management: Android data storage 11%


0% 5% 10% 15% 20% 25%

Figure 25. The 10 most critical vulnerabilities in mobile apps noted in 2014

Focusing on the vulnerabilities considered vulnerability was Null Dereference (21


critical to mobile applications, the list percent), which can lead to an application
becomes very different from the 10 most crash when executed. Furthermore, outside
common vulnerabilities. Insecure Transport of the top five aggregated categories above,
takes the top spot with 24 percent of unreleased streams (18 percent) were
applications exhibiting critical issues common along with excessive (Unnecessary
(compared to the 32 percent overall that had Permission, 11 percent) and risky (Android
insecure transport issues). Interestingly, the Data Storage, 11 percent) privilege settings.
second most commonly observed critical
Open source software organization. The information in this section
is intended to help organizations to really
dependencies understand how and if they are likely to
be affected by integrated open
Organizations have relied on open-source
source components.
components to build their software since
the beginning, and more so since the late
Approach
90s when the Open Source Initiative (OSI)
HPE Security Research analyzed Sonatype
was formally established. However, little
third-party library security data for
or no attention was paid to the increase
over 100 randomly selected real-world
in attack surfaces due to integrated open-
Java applications provided by the HPE
source components. As mentioned earlier,
Fortify on Demand managed service. The
manifestation of several critical vulnerabilities
reported data contains name, version, and
(such as Heartbleed, Shellshock, and Poodle)
a list of CVEs associated with open-source
in prevalent libraries (such as OpenSSL
components referenced in each application.
and Bash) has brought renewed attention
Furthermore, the data also contains the
to software dependencies. There is an
fraction of open source components
increased interest in accounting for these
referenced by each application.
components in overall risk assessment for an

6%

5%
% of projects drawn from sample

4%

3%

2%

1%

0%
6%–39% 40%–49% 50%–59% 60%–69% 70%–79% 80%–89% 90%–100%
open source open source open source open source open source open source open source

34%
% of open source components in app

use no open source components


(these data points were excluded from the chart)

Figure 26. Distribution of open-source components referenced by application


The graph above shows the percentage One hundred thirty-two unique CVEs were
of open-source components referenced in reported across 88 unique components; 228
the projects we examined. We excluded the unique components when different versions
34 percent of projects we examined that are considered. These were distributed
contained no open-source components, across six kingdoms of categories related
and ranged the remaining projects along to problems in the code and one kingdom
the X axis, from just a bit of open-source related to problems outside the code, such
presence on the left to nearly 100 percent as environment. It is interesting to note the
open source at the far right. We noted that absence of code quality issues in the publicly
over 55 percent of the projects we examined disclosed list of CVEs. One perceived reason
were over 50 percent open source—that could be that most critical code-quality
is, over 50 percent of their components are issues such as double-free or memory leak
distributed as open source. Over 10 percent are related to C, as opposed to the
of the projects we examined were 90 percent Java-based libraries referenced in the
open source or greater. projects we evaluated. Although such issues
need to be addressed to ensure the desired
Issues inherited from functionality from the application, apparently
open-source libraries they are not often reported to the National
Next we investigated the type of issues that Vulnerability Database.
are inherited from open-source libraries.
To better understand the type of risks
associated with these CVEs from the data,
we mapped each CVE to the HPE Software
Security Taxonomy.

Security feature
Encapsulation API abuse
20%
1%
3% Errors
2%

12% Other
1%
68% Environment
5%
Input validation and representation
Time and state

Figure 27. Unique CVE distribution across kingdoms


Sixty-eight percent of vulnerabilities are Entity Injection are the most frequently
due to inadequate input validation. Within reported categories. All issues reported were
the Input Validation and Representation spread across 33 categories and most were
kingdom, Denial of Service and XML External concentrated in the top 10.

Critical High Medium Low % project count


25 50%

2 45%

20 40%

32% 32%
Unique CVE count

% of projects
15 30%
27%

19 22%
10 1 1 20%
4 15% 15%
11
13%
2
5 6 1 10%
9 9 2
7% 7 3
7 5% 4
2 2 3
2
0 0%
c e o n o n o l ng L n n n e
vi ti ti tr ti SS ti
o
ti
o
ti
o
tu
r
r c c n p e ua xa a a
se je je co ri ur al fi ul gn
of in in s s sc s ec ev n n ip si
al ty on ce te In de io ma ic
ni ti ss
i Ac -s
i
co ss er ap
h
De en re ss c Se ad gr
l p o i o o
rna ex Cr nam sl pt
te NL Dy as cr
y
ex OG Cl k
a
XML We

Figure 28. Top 10 vulnerability categories by unique CVE and severity distribution

Denial of service is the most commonly a small fraction of applications reviewed. The
reported category; however, it is not the majority of projects inherit denial of service,
most critical. OGNL expression injection cross-site scripting, and insecure SSL issues
is the most commonly reported critical from third-party libraries.
category; however, at 7 percent it affects only
Unique CVE count % project
6 30%

28%
5 5 25%
5

% project count (library usage)


25%

4 4
4 20%
Unique CVE count

19% 19%
17% 3
3 16% 15%
3
14%
12% 12%
2 10%
2 2
10%

1 5%
1 1

0 0%
: : ts : pl : : n :
ad nt ru k is lm rk io la ts
lo oad ie ent st or ax es wo ar xa en
u p c l : e w : r c m e t u : o n
e- pl tp li s am is xe ra mc an la
n mp
il eu ht pc ut fr eb ax : gf bv .s xa co
s -f -fil n s- -htt s tr i ng ingw e s r in g-we c he lsec t tp ient
on s o r rc sp n a h
mm on mm ns sp spr xe g. ri ap xm e. cl
co comm co ommo g. or sp g. ch tp
c or or a pa ht
g.
or

Figure 29. Top 10 popular libraries and unique CVE distribution

Popular libraries have on average three Libraries with the most vulnerabilities
issues, while most have fewer than are less popular. They also produce
five issues. fewer releases.

Unique CVE count Component version count % project


20 25%
18
18
16
16 15 15 20%

% project count (library usage)


14
14 14
Unique CVE count

12 12
15%

10

8 19% 19% 10%


6 6 7
6 5

4 4 5 4 5%
7% 2 2 2 12%
2
2 1 1
2% 2% 5%
0 1% 1% 1% 0%
: : : : : : : ts : :
t s r k a t a t n y n y ty ru o k
t ru e x wo o mc na o mc p ho p ho j et st ri or
. s or s . . t li . t a y m y m k y . : t ua m ew
e t e e s s a s n a
ch -c ru e ch ta ch in pen work pen xwor tb y ut sa fr eb
pa s2 st or pa ca pa al o x o or tt str e. ec ng -w
g .a trut h e. rk-c g.a cat- g.a cat om. g .m je a ch xmls pri ring
or s ac o or tom or c or ap s
g. sp
ap xw g. or
g. or
or

Figure 30. Top 10 vulnerable libraries by unique CVE and severity distribution
The Heartbleed effect additional categories (appliance, operating
system, and programming language/dev
Our analysis in the section above shows that environment) that are an essential part of
the use of open-source libraries is extensive. an IT environment. We then examined data
Two-thirds of all applications built today on vendor response and remediation efforts
rely on open-source components. Once around the Heartbleed vulnerability. We
a component is integrated, vulnerabilities compared vendors’ response to Heartbleed
in those components are inherited in the with response to an OpenSSL vulnerability
software. The new software can in turn be (CVE-2013-4353) that was reported before
referenced to further, creating a multiplicity Heartbleed, and another one (CVE-2014-
factor for pre-existing security issues. The 0224) that was reported after Heartbleed.
Heartbleed bug is an example of such
a scenario. The objective of this comparison was to
analyze the response to various OpenSSL
To analyze this situation, we selected a issues by dependent vendors in 2014.
group of components that integrate the
OpenSSL library and could be present Our research looked at response time for
in the server environment in some form. various vendors based on publicly available
Researchers at the University of Michigan information. It should be noted that some
performed a detailed analysis147 of the vendors might have notified their users
Heartbleed bug, which is CVE-2014-0160. privately. In addition, “No information” could
As part of their cyber security research, mean that either the vendor ignored the
they surveyed components that integrated issue and thus failed to notify users or that
the OpenSSL library and were affected by the vendor did not depend on a vulnerable
Heartbleed bug. The list of components version of OpenSSL and hence was
we have selected is an extension to the list not affected.
provided in their research; we added three

100%
DoS SSIv3_take_mac
% vendors that announced remediation

90% (CVE-2013-4353)
Heartbleed
80% (CVE-2014-0160)
CCCS MITM injection
70% (CVE-2014-0224)
60% No information

50%

40%

30%

20%

10%

0%
Web server Mail server Operating system Appliance Programming Database
language/Dev
environment

Figure 31. Dependent vendor remediation trend for OpenSSL security issues
A significant number of vendors did The “Heartbleed effect” has resulted in not
not openly acknowledge and remediate only more vendors opting to remediate
weaknesses inherited from OpenSSL before OpenSSL issues, but also in improved
Heartbleed, whereas the trend seemed to response time to remediate these issues. The
change post-Heartbleed. figure below shows the maximum number
of days taken to remediate OpenSSL issues,
Fewer disclosures were noted for mail as measured by notifications made public.
server libraries using OpenSSL. Most of We have averaged across all three OpenSSL
these libraries rely on dynamic binding of issues, adjusting for the corresponding type
OpenSSL, which shifted the onus to users of vendor.
to keep their installed OpenSSL
packages updated.

Average
27
56 DoS SSIv3_take_mac
Database 87 (CVE-2013-4353)
0 Heartbleed
(CVE-2014-0160)
8
3 CCCS MITM injection
Programming language/ 24 (CVE-2014-0224)
Dev environment 0

75
64
Appliance 7
190

2
1
Operating system 1
14
24
4
Mail server 22
56
22
26
Web server 7
98
0 20 40 60 80 100 120 140 160 180 200
Days to remediation

Figure 32. Maximum days to announce remediation by category


Based on the data above, operating systems • Only automated scans that performed
have stellar performance when it comes to static code analysis were considered.
remediating dependent vulnerabilities. This
• All vulnerabilities considered were detected
could be because they are most critical to
and fixed within the past year.
providing indirect dependence to installed
applications via dynamic binding. A slow
The typical process between the first
response from appliances can be attributed
scan on an application and the following
to various reasons:
remediation scan is as follows.
• Often users do not have information
1. User requests a scan of an application.
about software components that run on
their appliances. 2. Automated static code analysis of the
application is performed.
• Appliances may not be embedded further
to create a multi-level dependency, 3. HPE auditors audit the results of the scan.
reducing user awareness of the
4. HPE operators publish the audited results.
vulnerability and demanding a fix from
appliance manufacturer. 5. User reviews the results. The user may
request a re-audit of certain issues based
• Appliances may not be updated easily.
on the business criticality of
• While the worst maximum fix times show certain applications.
up in the Appliance category, in that
6. User triages the results and assigns to
category that was the only appliance that
developers. In some cases, developers
actually pushed a fix for a pre-Heartbleed
may directly triage the issues.
OpenSSL issue.
7. Developers fix the issues.
Most vendors do not maintain and provide
8. QA validates the fix. This may involve
a list of all third-party components that
several iterations depending on the
their software depends on, resulting in
quality of the fix.
an incomplete risk profile for users of the
components. Furthermore, most licenses, 9. The organization may submit the new
while requiring embedding software to version immediately or batch many fixes
disclose usage of the library, don’t impose together before sending a newer version
version number disclosure on the vendor. for assessment.
We as the software industry need to make
10. HPE performs the remediation scan and
including a list of third-party components
validates the fix. The entire cycle may be
along with version number in software
repeated for issues that weren’t fixed in
specification an essential part of the
this round.
software disclosure for adequate risk
assessment for organizations. In order to better understand when most
of the vulnerabilities in a given kingdom or
Remediation of static issues severity were fixed, the statistical median
value was considered to plot the
For the purpose of analyzing remediation graph below:
patterns of vulnerabilities in Web
applications, a subset of the overall sample
set in previous analyses was taken. This
selection was done based on the
following criteria:
12 Median per Kingdom Critical High
12

10
10

8
8

7 Critical average: 6
6
6
6
5 5 High average: 4
4
4

3 3 3
2
2 2

0
e y on nt rs s e
us it ti me ro on re at
ab al la on Er ti n tu st
I qu u r da tio ea d
AP de ps vi l i a f a n
Co ca En va ent ty me
En t s ri Ti
n pu pre e cu
I re S
d
Kingdoms an

Figure 33. Median number of scans to remediate critical vulnerabilities

The graph represents the median number We were hoping that critical vulnerabilities
of scans to fix a critical or high vulnerability would be the fastest to fix. Interestingly, this
in a given kingdom. As an organization, it was not always the case. One possible reason
would be interesting to verify the frequency could be that most organizations tend to fix
of static scans done on an application during and verify all critical and high vulnerabilities
its lifecycle, and in turn to calculate the first. Hence, the developers could be
number of days it takes to verify a fix for that prioritizing their tasks from a single bucket
application. This would also give an idea of based on the ease of completing the task,
the risk assumed by the organization during rather than the severity of the issue.
that period (this only applies to applications
in a production environment).
The overall data (not represented in the While issues generally get fixed after
graph above) also showed that anywhere between two to 12 scans, not all
environment-related issues with lower of them get fixed. This could depend on the
severities were usually verified after a very sensitivity of the application and the risk
long time—as much as 240 scans later. This appetite of each organization. HPSR was
might be acceptable, because typical fixes interested to see if there were any patterns
to environment issues involve tweaking the that stood out while looking at the whole
server or application configuration toward picture, agnostic of the application and the
the end of a release to meet the security organization. Below is the chart that provides
standards of a production environment this data.
(while the application is developed in a test
environment). It could also indicate that
some organizations may perform multiple
scans within short intervals, or have long
development periods between releases.

Issues fixed per Kingdom Critical High Medium Low

100%
100%
90%
90%
84%
81% 82%
80% 75%
70% 72%
% of issues fixed

70% 67% 68% Total issues fixed: 68%


64%
61% 61%
59%
60% 57%
55%
57%
52% 52%
50%
43% 44%

40% 36% 35%


32%
30%
30%

19%
20% 17%

10%

0%
e y on nt rs s e
us it ti me ro on re at
ab al la on Er ti n tu st
I qu u r da tio ea d
AP de ps vi l i a f a n
Co ca En va ent ty me
En t s ri Ti
n pu pre e cu
I re S
d
Kingdoms an

Figure 34. Issues fixed by kingdom; higher numbers are better


In a typical security development lifecycle, The good news, if there is good news to
Ironically, misused security it is recommended that corporations have be had, is that the uproar around such
features continue to be the practices in place for identifying weaknesses high-profile incidents as Heartbleed and
trouble area for both Web and in their applications. As part of that lifecycle, Shellshock may yet lead software developers
mobile apps. it is the responsibility of the team to verify and architects to tackle security issues,
that known vulnerabilities and any close particularly those in foundational or legacy
variants have been mitigated. In studying the code, more effectively. We saw that repeated
data from the past year, we have observed scans lead to better software, and that
that for those applications that are following the open-source development community
a security development lifecycle, where seems to be selecting for healthier, better
applications are analyzed more than once, componentry—components with more
over 68 percent of vulnerabilities are security issues simply aren’t used as often by
being resolved. other developers.

Overall, the percentage of issues fixed in That said, vulnerabilities are still pervasive.
the Security Features, Encapsulation, and Sorting the vulnerabilities we discovered into
Code Quality kingdoms are relatively high. the categories of our taxonomy, we found
It is also interesting to note that in the Input every indication that more Web and mobile
Validation and Representation kingdom, apps contained discoverable vulnerabilities.
where the more well-known vulnerabilities Ironically, misused security features continue
such as cross-site scripting and SQL injection to be the trouble area for both Web and
reside, the percentage of critical and high mobile apps. There were a few differences
issues fixed are similar. This could imply that endemic to each type of application; the
such injection issues are prioritized and fixed nature of mobile apps means they’re
together during implementation. particularly prone to code quality issues
rarely found in Web apps, while Web apps
suffer from the types of problems covered in
Conclusion the errors section of our taxonomy.

Knowledge is power; being aware of the Progress is possible. Despite the rise in
specific circumstances that give rise to detected vulnerabilities, the very fact that
vulnerabilities lets security practitioners they are daylighted means that they can
address their root causes—even, if healthy be analyzed and addressed. Our research
secure development practices are followed, indicates that critical-class vulnerabilities
before they are committed to code and are taken seriously and given patch-
released to an unsuspecting world. development priority—not a surprising
find, when one remembers that post-
For a snapshot of the state of application release patching remains part of a healthy
security in 2014, we analyzed a sample set development lifecycle, but perhaps a sign
of security audits performed by HPE Fortify that smart practices truly do take hold
on Demand on 378 mobile apps, 6,504 Web and crowd out lesser habits in the
apps, and 138 Sonatype reports from 113 security ecosystem.
projects. These audits include results from
static, dynamic, and manual analysis. All
identified issues were classified according
to the HPE Software Security Taxonomy
(originally the “Seven Pernicious Kingdoms”),
updated and refined in mid-2014 and under
continued expansion in 2015.
Summary In the face of increasing threats, software
vendors continue to make it more difficult for
attackers with the implementation of security
In a world where more and more people and mitigations. However, these mitigations are
devices connect to the Internet, greater focus not enough when they are built on inherently
must be placed on security and privacy. vulnerable legacy code. On multiple
The past year has seen the manifestation occasions in 2014, high-profile vulnerabilities
of several vulnerabilities that gathered a were discovered that left enterprises
storm of media attention. Network defenders scrambling to deploy patches and clean
should use the information in this report to up compromised machines. Watching
better understand the threat landscape, and the industry respond to the Heartbleed
best deploy resources to minimize security vulnerability highlighted how unprepared
risk. While the Internet has brought global we were for this type of disclosure. Due to
connectivity to millions, the darker side of the severity and active exploitation of the
the Internet is pervasive and influential. vulnerability, corporations were forced to
Our report shows the machinations and respond quickly, and to patch servers that
maneuvers of criminals and state-sponsored were not routinely patched. The issue existed
operators in the cyber underground have in an application library that did not have a
significant and lasting effects on the clear update path; enterprises did not have
security of the greater Internet and our a solid understanding of which applications
greater societies. Cyber crime comes in were using this library and where it was
many flavors, but it remains vastly driven located inside of their networks, further
by financial interests. Looking into nation- complicating efforts.
state-sponsored cyber activity highlights
the many levels at which cyber operations Discovery of information disclosure
and state-sanctioned activity can occur, vulnerabilities such as Heartbleed shows
and demonstrates how malware and the why information disclosure vulnerabilities
tools and techniques of cyber criminals can are highly valued by the exploitation
be utilized in different ways to accomplish community. These issues can also be
different goals—such as stifling protest or used in conjunction with remote code
targeting opposing state interests, as well execution vulnerabilities to bypass modern
as perpetrating fraud or stealing exploit mitigations. Heartbleed was a nice
intellectual property. demonstration of a highly controllable
information disclosure vulnerability due to
Responses to this long-recognized threat a buffer over-read. Vulnerabilities found in
and international cooperation to address legacy code were also a significant factor in
these attacks are improving and continue 2014, with flaws in Adobe Flash Player and
to gain momentum. Other nations also pose RTF parsing in Microsoft Office being prime
significant threats in our globally connected examples. In each case, either legacy or
world. Iran continues to develop its cyber deprecated code was at fault. As the quality
capabilities and views hacker groups as of exploits continue to improve, they reveal
a force multiplier to be used to target a deep understanding of the nature of the
Western entities, particularly corporations vulnerability and the internals of the
and government entities. North Korea has target applications.
continued its tradition of asymmetric warfare
in the age of the Internet, with a remarkable The year 2014 saw the growth of malware
commitment to developing cyber warfare continue to increase, with the number of
capabilities even as it copes with aging newly created malware samples doubling
infrastructure. As far as financially motivated year over year. It was also a significant
attacks go, while systems such as “chip and year for mobile malware, as 2014 was the
pin” are likely to prove useful, as particular year when mobile malware finally stopped
points in financial processes get hardened, being seen as just a novelty. While the
other points become more attractive to majority of Android malware discovered in
attackers, and as technology develops to 2014 was found outside of the Google Play
improve the security of systems, it also market, there have been instances when
conversely develops to make particular malware was placed there by maliciously
targets increasingly accessible. We expect created developer accounts. Ransomware
escalations in this area to continue. was also a key theme throughout this past
year as attackers continued to exploit a
business model where users’ data is held for communication layer vulnerabilities, as well
Jump in issues concerning the ransom by malware often using asymmetric as possible vulnerabilities in cloud service
realm of security features from encryption algorithms. Perhaps the most infrastructures and smart device applications.
2013 to 2014 notable ransomware is CryptoLocker, which
appeared at the end of 2013 and caused In general, 2014 saw more Web applications
100% significant damage prior to an FBI-led containing vulnerabilities in each
takedown. CryptoLocker has spawned a security kingdom than they did last year.
80%
86% number of copycats, with CryptoWall the Issues concerning the realm of Security
60% 72% most well-known. Features—including access control, privacy
40%
violation, password management, insecure
The threat from malware continues to transport, and security of cryptographic
20% rise as the attacks on Target and Home primitives—jumped from 72 percent in
0% Depot highlighted the risk from point-of- 2013 to 86 percent in 2014. This statistic is
2013 2014 sale (POS) devices. By looking at the POS consistent with the recent rash of privacy
malware responsible for these breaches, we and confidentiality breaches, ranging from
have discovered that this type of malware stolen personal data to credit card numbers
is being actively developed by multiple to personal health information. The Security
groups. Our investigation uncovered ongoing Features kingdom also greatly affects mobile
development, increasing sophistication, platforms, as the percentage of mobile
and a divergent code base in current POS applications that contain security features
malware. Significantly, these programs were issues (97 percent) is higher than that of
built by people who knew the targeted Web applications (86 percent). Looking at
environments. The attackers using them had data analysis of over 6,500 applications,
gathered initial intelligence from the targeted increases in vulnerability distribution
systems before creating custom malware to by security kingdom grew in all but one
exploit them. This highlights the planned category (and that category decreased by
nature of these attacks and reminds us that just 1 percent).
attackers are increasingly playing the long
game. Enterprises must be able to monitor While the threat from the Internet itself
their networks and systems in a manner that can take on an increasingly global scale, a
allows them to discover malicious intelligence worldwide network of security researchers
gathering and reconnaissance activities that stands ready to help the software industry
may herald an approaching attack. secure its code. The HPE Zero Day Initiative
is the world’s largest vendor-agnostic bug
There appears to be growing consumer bounty program, with almost 10 years’
awareness about privacy issues at the experience coordinating vulnerability
Internet of Things (IoT) level, whether that’s disclosure. Over its history, it has grown
concern that one’s television or thermostat to a network of over 3,000 independent
represents a security and privacy risk or researchers working to expose and
something else. The mass theft and online remediate weaknesses in the world’s most
posting of private photos from hundreds of popular software. Over the past two years,
celebrities blurred the line between security researchers representing several new regions
and privacy, as what first appeared to be an (including Germany, South Korea, China, and
intrusion shaped up to be a bad combination the Russian Federation) popped up with
of poor password choice and inadvertent high submission rates and quality technical
saving of data to the cloud. IoT is much analysis. Researchers in these countries
more than a buzzword—it’s a new paradigm are not only focusing on vulnerability
that brings ubiquitous computing and its discovery but also on innovative
security implications closer to the average exploitation techniques.
person. Attacks could involve various layers
of the device infrastructure. This could Looking ahead, technology continues to
include applications running on smartphones enhance our world in numerous ways,
or tablets, cloud services (including and with that comes the challenge of
firmware and network service stacks on maintaining security and privacy throughout
Wi-Fi modules) as well as the firmware and our digital lives. However, with increased
application layers on the host processor. cooperation and a thorough understanding
Various vectors of propagation could also be of the imminent threats, we can continue
used, including compromising update files to increase both physical and intellectual
and exploiting network and host processor costs an attacker must spend to successfully
exploit a system.
Authors and contributors
The HPE Cyber Risk Report 2015 is an annual collaboration.

Authors Contributors

Dustin Childs Joe Gura

Art Gilliland Ted Ross

Brian Gorenc Jewel Timpe

Heather Goudey ReversingLabs

Angela Gunn Sonatype Inc.

Alexander Hoole

Jason Lancaster

Sasi Siddharth Muthurajan

Jeong Wook Oh

Yekaterina Tsipenyuk O’Neil

John Park

Oleg Petrovsky

Joe Sechman

Nidhi Shah

Tim Sotack

Vanja Svajcer
Glossary and reported on by Mandiant. Mandiant
reports that this group has been in operation
at least since 2006 and has been involved
29A in a number of operations to steal terabytes
A notorious virus writing group established of sensitive and confidential data, including
in the mid-1990s that published an e-zine on valuable intellectual property from dozens of
virus writing of the same name. “29A” is the organizations in various industries.
hexadecimal representation of the
number 666. Blackshades RAT
A remote access Trojan (RAT) that allows
AES (Advanced Encryption Standard) unauthorized access and control of
A cryptographic standard , based on the computers on the Windows platform. This
Rijndael cipher, specified by the National particular RAT came to be quite notorious
Institute of Standards and Technology and was the subject of raids by the FBI on
(NIST) in the United States for the over 100 people in 2014 that led to dozens
encryption of electronic data. AES is a of arrests.
symmetric key algorithm and replaced the
previous standard, DES (Data BrowserLock
Encryption Standard). A type of malware known as ransomware.
Ransomware is malicious software that locks
ASLR (Address Space Layout a user’s computer in some way and then
Randomization) demands a ransom in order for service to be
A security mechanism where the locations of restored. As the name suggests, this malware
important elements of a program in memory locks the affected user’s Web browser and
are randomized in order to make them holds it to ransom.
harder for an attacker to find and utilize. This
increases the difficulty for the attacker to Buffer overrun/overflow
perform particular types of exploit that rely A buffer overflow is a type of vulnerability
on jumping to particular address areas that arises when a program writes an
of memory. excessive amount of data to the buffer,
exceeding the capacity of the buffer and
Anonymous then overwriting adjacent memory. This type
A loosely associated and informal group of of vulnerability may be exploited to crash
hacktivists that participate cooperatively programs or, with the correct manipulation
in various forms of protest online. Types by a skilled attacker, used to execute
of protest have included Denial of Service arbitrary code on a targeted computer. Buffer
(DoS) attacks and website defacements vulnerabilities can be avoided by the use of
against various entities, including bounds checking, which checks the capacity
government and commercial organizations, for inputs before they are written.
and protesting against a broad range of
different political and social issues from Bytecode
digital rights management and anti-piracy to A form of instruction set designed for
revenge porn. efficient execution by a software interpreter.
Bytecodes are compact numeric codes,
API (application programming interface) constants, and references (such as numeric
A set of tools and resources that provide addresses), which encode the result of
various functions developers can utilize parsing and semantic analysis of things like
when creating software. type, scope, and nesting depths of
program objects.
APT1 (Advanced Persistent Threat 1)
A Chinese cyber espionage group tracked
C&C: See Command and Control execution of arbitrary attacker-supplied code
on a targeted system. The risk of command
Cabir injection attacks can be mitigated by
The first malware written for mobile devices, appropriate input checking and validation.
first detected in 2004. Cabir was a worm
that targeted the Nokia Series 60 Symbian Cross-frame scripting
platform and spread via the Bluetooth® A form of cross-site scripting attack, in which
OBEX protocol to other phones. It was proof- an attacker exploits a vulnerability in a Web
of-concept malware created by the virus browser in order to load malicious third-
writing group 29A. party content that they control in the frame
of a webpage on another site. This attack
Clickjacking may allow an attacker to steal sensitive
A technique used to make a user take an information, such as login details, that may
action of an attacker’s choice by clicking be input into the frame because the targeted
on part of a webpage. While the user may user believes the request for login details
believe they are clicking on something came from the legitimate site.
innocuous, in effect they are performing
an action that is required by the attacker in Cross-site scripting
order to achieve their goal—for example, by An attack that occurs when an attacker
taking the action of clicking on a particular exploits a vulnerability in Web applications in
object on a page, a user may inadvertently order to inject malicious code into client-side
execute a script or comply with a request to code that is delivered from a compromised
grant a particular type of risky activity. website to an unsuspecting user. This code
that is delivered to the user is trusted, and
Command and control (C&C) hence executed, as it appears to come from
As with many terms used in computer a legitimate source. These types of attack
security, this term has been borrowed from occur due to insufficient checking and
the military. Similar to the military use of validation of user-supplier input. Attackers
the term it means a method of exercising may use this type of attack in order to
authority over resources, for example, a bypass access controls or steal
commanding officer commanding his troops. sensitive data.
This term is often used in the context of
malware and botnets in particular, where a CryptoLocker
structure is set up to command and control A type of malware known as ransomware.
many compromised computers from either a Ransomware is malicious software that locks
centralized, or is some cases, decentralized a user’s computer in some way and then
position. A centralized command and demands a ransom in order for service to be
control structure might be a single server restored. In the case of CryptoLocker, as the
that compromised computers connect to in name suggests, users’ files are encrypted
order to receive commands. A decentralized using an asymmetric encryption algorithm.
command and control structure could be A ransom is then demanded from affected
where compromised computers connect to users in order to decrypt and therefore
a peer-to-peer network, where commands restore their files. CryptoLocker was first
are spread through the network from many discovered in the wild by researchers in 2013.
possible nodes. Command and control may It was reported to have been propagated via
also be known as C2. the Gameover Zeus botnet. The “success”
of ransomware such as CryptoLocker has
Command injection spawned many copycat programs. The best
Command injection occurs when an attacker way to avoid being the victim of ransomware
is able to pass unsafe data to a system is to ensure that regular backups of your files
shell via a vulnerable application so that are created and maintained, and then stored
the unsafe data is then executed on the in an unrelated system; thus, if files are
targeted system. The result therefore of a encrypted, they can be restored
successful command injection attack is the from backup.
DEP (data execution prevention) This is often performed as a separate step,
A security measure used by modern by separate tools from those that may
operating systems that is intended to be used in order to first compromise the
prevent the running of malicious code on an targeted system and then to capture and
affected system. It operates by marking areas store data. In order for data to be exfiltrated,
of memory as either executable or non- for example, it may need to be moved to a
executable and raises exceptions when code computer that has access to the Internet.
attempts to run from areas that are deemed
non-executable. Exploit
Code written expressly to take advantage
Decebal of the security gap created by a particular
Decebal is named after the Romanian vulnerability in order to deliver a malicious
Emperor “Decebalus,” the last king of Dacia, payload. They may be targeted at specific
and is a VBScript-based POS malware organizations or used en masse in order
created by Romanian cyber criminals. Similar to compromise as many hosts as possible.
to Dexter, it also scrapes memory for track Delivery mechanisms utilize many different
2 credit card information and sends it back technologies and vehicles and often contain
to C&C servers. Decebal was observed in the a social engineering element—effectively
wild in early 2014, although various samples an exploit against vulnerabilities in human
since captured appear to date it back to nature in order to make the victim take a
mid-2013. It is written in Microsoft Visual particular action of the attacker’s choosing.
Basic, which is an event-driven programming
language that follows the COM programming External leakage
model. This makes it ideal for the malware to An external information leak occurs when
target point of sale systems that run system data or debugging information leaves
OPOS systems. the program to a remote machine via a
socket or network connection.
Dexter
POS malware that was first discovered in Fakeinst
the wild in 2012. Dexter uses RAM-scraping Mobile malware that targets the Android
techniques in order to capture credit card platform. The Fakeinst family of malware
details from track 2 data captured on masquerades as helpful installers that are
POS systems. used to install other useful applications.
However, once executed they attempt
Directory traversal to send SMS messages to premium-
A directory traversal occurs when an attacker rate services, leaving affected users with
is able to access areas of a system that are unexpectedly high phone bills.
not intended to be publically accessible.
This may occur due to inappropriate or Foundational technologies
insufficient checking of user-supplied A technology that provides infrastructure
data that contains characters that may be for another technology. For example,
interpreted to traverse paths to a parent a document management system
directory of the targeted system. could require a relational database as a
foundational technology.
DoS (denial of service)
A condition that occurs when the resources Frame-sniffing
of a system are exhausted in some manner These attacks occur when an attacker uses a
that causes the system to stop responding. hidden HTML frame to load a target website
inside an attacker-controlled webpage. By
Exfiltration doing this, attackers can access sensitive
In the context of computer security, information about the content of
exfiltration refers to the removal of valuable framed pages.
captured data from a compromised system.
Fuzzing a vulnerable version of OpenSSL. Successful
This is an automated vulnerability research attacks could result in the disclosure of SSL
technique that involves using a fuzzer (a private keys, usernames/passwords, and
fuzzing tool) to inject malformed data to an session tokens.
application in order to attempt to cause it
to crash. This technique is used to uncover Information disclosure vulnerability
possible areas of weakness or vulnerability A vulnerability that results in the
within the application for further research unauthorized disclosure of information
and testing. from a system. The effect of this type of
vulnerability varies according to the nature
Gameover Zeus of the information that may be disclosed.
A notorious botnet consisting of peer-to-peer Such information could be used in order to
variants of the Zeus malware family (also conduct reconnaissance before a targeted
known as Win32.Zbot). By using peer-to-peer, attack, or could be the end game of the
this botnet used a decentralized command- attack. The Heartbleed vulnerability was
and-control infrastructure, thus avoiding the an information disclosure vulnerability that
single point of failure of more centralized allowed for unauthenticated remote attackers
command and control structures and making to disclose the memory of applications that
the botnet more resilient to takedown. The use a vulnerable version of OpenSSL.
Zeus malware family is associated with
the sophisticated theft of online banking Juche
credentials; however, the botnet may have A North Korean political ideology that
been used to carry out other malicious proposes that the future independence
activities such as propagating additional of the North Korean state is determined
malware, sending spam, and carrying out by the agency of its people. This principle
distributed denial of service (DDOS) attacks. (simplified here) is used to drive and
In mid-2014, U.S. authorities brought down a promote policy in North Korea.
large botnet of Gameover Zeus variants and
caused significant disruption to the botnet’s Keylogging
malicious activities. The act of capturing keyboard events, such
as keystrokes, in a log file that can later
Gepaw be exfiltrated by an attacker. This type of
Malware written for the Android platform function may be used to capture sensitive
that targets online banking users. One information such as login details for
of the first Android malware samples to various systems.
be purposefully installed by a Windows
component if an Android device was Legacy code
connected to the desktop. Code within a software program inherited
from a previous version of the program.
Heap spray
Heap spraying is a technique used by Middleware
attackers to assist in use-after-free The software that sits between layers of
exploitation by decreasing entropy in the other software to make the layers below
address space. It is not itself an exploit and on the side work with each other. It is
method; instead, it aids attackers by making software invisible to the user that takes two
freed memory space more orderly and or more different applications and makes
predictable. Heap spraying consists of them work seamlessly together.
forcing repeated allocations in an attempt
to reclaim the freed buffer and to introduce MoneyPak
some usable order to the freed space. An online payment system, often used by
the perpetrators of ransomware and rogue
Heartbleed antivirus software, to gather ransom and
A flaw, discovered in 2014, that allowed extortion payments from victims.
for unauthenticated remote attackers to
disclose the memory of applications that use
Mozart Segfault
RAM-scraping POS malware that was used A segmentation fault (segfault) occurs when
in the Home Depot breach in order to steal a program attempts to access a memory
the details of over 56 million debit and location that the program is not allowed
credit cards. to access. Segfaults may also occur when
a program attempts to access a memory
mTANs location through a method that is not
A one-time password used by some allowed. An example of this would be a
online banking providers in order to program attempting to write to memory
authorize transactions. marked as read-only.

Private keys Shellcode


Within a public key cryptographic system, a A small piece of code used as the payload
private key is one only known by its owner. during the exploitation of a vulnerability.
Also, a term used to represent symmetric key While these types of payloads typically
encryption, which is encryption based on a start from a command shell, any code that
shared secret between two or more performs a similar function is generically
entities communicating. referred to as shellcode.

RAM scraping Shellshock


RAM scraping occurs when the malware A family of security vulnerabilities in
enumerates the processes and virtual the UNIX® Bash shell, first disclosed in
memory space of the target machine looking September 2014.
for track 1 and track 2 data.
Songun
Ransomware A North Korean social ideology that
Ransomware is malicious software that prioritizes the needs and preferences of the
locks a user’s computer in some way and Korean People’s Army in affairs of state and
then demands a ransom in order for service in allocation of resources.
to be restored. This locking may include
encrypting the user’s files in some way and Spaghetti code
then demanding payment for the decryption A pejorative term for software that has an
key, or it could be more simplistic and only overly complex and tangled control structure.
rely on giving the user the impression that Code of this type is named because the
their computer is locked (even though it may program flow is conceptually like a bowl of
be easily recoverable). spaghetti (e.g., twisted and tangled).

Remote code execution (RCE) TOR


vulnerability Free software designed to allow users
A vulnerability that allows attackers to to enable online anonymity and resist
execute their own code on a target system. censorship. By directing traffic through
Depending on the vulnerability used, the thousands of relays, TOR (The Onion Router)
RCE may be executed with either user- or conceals a user’s location and network usage
system-level permissions. from those attempting to conduct network
monitoring or traffic analysis.
ROP (return oriented programming)
An exploit technique that allows an attacker
to execute code while bypassing certain
types of defense-in-depth measures, such
as ASLR.
Track 1 and 2 data confidentiality, or integrity of software or
Track 1 and track 2 data are stored on the hardware. Vulnerabilities can be exploited
magnetic strip on the back of a credit card. to subvert the original function of the
The strip includes the account number targeted technology.
associated with the card, its expiration date,
and additional details that determine how Worm
and which transactions will be processed. A self-contained malicious program that
is able to spread of its own accord. The
Trojan classification “worm” is only used to describe
Malicious software that, unlike worms or the ability to spread without a host file (as
viruses, is unable to spread of its own accord. may be the case with computer viruses) and
There are many different types of Trojans worms contain many different and varied
that are used in conjunction with other types payloads beyond spreading from host
of malware in order to perpetrate computer system to host system.
crime. One of the most notorious types is a
remote access Trojan (RAT) that can be used WSDL
by a remote attacker to access and control a Web Services Description Language; an
victim’s computer. XML-based interface definition language
used to describe the functionality offered by
Use-after-free a Web service.
A use-after-free vulnerability can occur when
memory is allocated to an object that is used Zbot: See Zeus.
after it is deleted (or deallocated). Good
programming practice dictates that any Zero day
reference pointing to an object should be A previously unknown vulnerability for which
modified when the memory is deallocated, no patch from the vendor currently exists.
to keep the pointer from continuing to It is referred to as a zero day because the
make the area of memory where the object vendor has had zero days to fix the issue.
once resided available for use. (A pointer in
this abandoned condition is broadly called Zeus
a “dangling pointer.”) If the pointer isn’t A family of malware that targets the Windows
modified and tries to access that area of operating system. It is used primarily to steal
memory, the system can become unstable banking information, but has also been used
or corrupt. Attackers can use a dereferenced to install the CryptoLocker ransomware. Also
pointer in a variety of ways, including see Gameover Zeus.
execution of malicious code.
Learn more at
Vulnerability hp.com/go/hpsr
Defects or bugs that allow for external
influence on the availability, reliability,

Sign up for updates


Rate this document

© Copyright 2015 Hewlett Packard Enterprise Development LP. The information contained herein is subject to change without notice.
The only warranties for HPE products and services are set forth in the express warranty statements accompanying such products and
services. Nothing herein should be construed as constituting an additional warranty. HPE shall not be liable for technical or editorial
errors or omissions contained herein.
4AA5-0858ENN, November 2015, Rev. 1

S-ar putea să vă placă și