Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Lenovo finally seem to understand that they hosed up, but Superfish thinks everything is fine with their software except for those meanie bloggers spreading lies.

Adbot
ADBOT LOVES YOU

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Next week at the malaria user group meeting..,

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

The Superfish stuff is comically, implausibly broken. I don't think any of us realized how deep the pit of stupidity would go while it was playing out.

At this point we're lucky that it doesn't execute base64'd x86 machine code stored in some extended attribute.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Khablam posted:

The private key (the one you need to decrypt) never leaves their server.

Whoa, it really does asymmetric encryption over gigabytes of data? I'd have thought that to be prohibitively slow, even if they used something faster than RSA.

Do you know what cryptosystem is typically used?

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

ElZilcho posted:

RSA is simply the key exchange/generation mechanism, AES256 seems to be the cipher of choice.

But AES is symmetric, so the decryption-capable key then has to reside in process memory during the locking process, rather than only on the attacker's server. I don't understand how or why you would use RSA to generate a key for AES, though I'm not really even an amateur cryptographer. By exchange I assume you mean the usual encrypt-symmetric-key-with-asymmetric-cipher sort of bootstrapping protocol?

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

I expected that it would generate a symmetric key, encrypt that symkey with the attacker's pubkey, encrypt the data with the symkey, and pop the alert. To unlock it sends the encrypted key to the C2 server which then gives back the symkey if payment has been rendered.

But the assertion was that the decryption key was never outside the attacker's server, which I think means there can't be a symmetric key involved. Otherwise dumping the process memory would let you recover the key without paying the ransom.

Being slow is probably OK, though.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Khablam posted:

If it's AES over RSA then it probably works like SSL encryption, where it's the actual symmetrical key itself that is exchanged/protected via RSA and the actual file-level encoding is done via AES. Either way, no part of your computer, drive, RAM or CPU actually sees (or needs to see) the private key to encrypt the data.

This is categorically false. If the cipher used to encrypt the file is symmetric, like AES, then the decryption key is identical to the encryption key, and the computer simply must have access to the encryption key in order to encrypt. That characteristic of symmetric ciphers is what motivated the developing of public-key cryptography, really.

PGP uses an asymmetric cipher to protect a symmetric key similarly to an SSL key exchange, because asymmetric crypto is (was?) too expensive to use on arbitrarily-large cleartext. That expense is what led to my initial question, since afaik it's the only alternative to the decryption key being resident on the victim computer.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

So, uh, does anyone actually know the crypto mechanics of these things?

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Thanks, that's exactly what I was interested in.

Does it rotate AES keys by any chance, so that some encrypted files are still locked even if it's caught and a key is extracted from memory?

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

pixaal posted:

Let's in theory say you could, this would require that you know its running to reverse it. It would be a simple party trick and nothing more. You wouldn't know its running until its too late, that is the point of it.

I don't think it's uncommon for it to be detected in progress due to file server overload or similar, but I don't have personal experience with it.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

In fact, this subthread started with someone saying they'd dumped the process in question, I think.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Khablam posted:

But when someone prefaces their question with "I don't know much about crypto"

Who said that? I have a pretty decent grounding in crypto, I was asking about the details of the mechanism and key management.

Both PGP and HTTPS lack the property of keeping the decryption key off of the encrypting computer, which was the assertion to which I was responding in the first place.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Yeah, it was a hysterical concession, but not even Taher minded.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

dpbjinc posted:

TLS isn't even an accurate name. It secures the Application layer, not the Transport layer.

How so?

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Do you also incinerate laptops if they get owned, or do you just reinstall the software stack? If you don't reuse compromised hardware after restoring from a known source, can I have your old stuff? I promise to be very careful with it.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Can I have your stuff?

I was thinking of reflashing like one does after bricking a device, but if you don't have a trusted channel for the reflashing then I can see the concern. Of course, I don't think I would reflash my PC BIOS (and video card, and so forth) as part of eradicating malware either, so maybe I'm just insufficiently paranoid.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Prosthetic_Mind posted:

Can your PC BIOS potentially subvert all communication going between your network and the internet to do things like steal banking and other information, as well as act as part of a botnet?

My PC BIOS can potentially subvert anything, it controls the way the OS gets loaded. It was in the NSA's catalog of dirty tricks that got leaked a couple years back, and Equation Group was doing it with drive firmware too.

E: http://www.wired.com/2015/02/nsa-firmware-hacking/ has a good overview. I don't even know how to reflash my drive firmware in a trusted way, so I guess I really should be pulverizing equipment and hitting NewEgg from a trusted device if I get owned...

Subjunctive fucked around with this message at 22:14 on Oct 5, 2015

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

wyoak posted:

It's certainly a matter of risk assessment vs cost but new routers are like $80 so pony up

lol at your peasant router I bet it doesn't even have an app

But yes, I was responding to the "potentially" aspect. I think I would be OK with tftp reflashing versus landfill for this case myself.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

The cheaper ones they can probably compromise during manufacturing.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

oh bean dip you have a full-take feed from my heart

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

In my business environment, if I get malware on my machine, I get a new piece of hardware and my documents copied over (but nothing executable and no source trees) while they analyze the victim machine. "In a business environment" doesn't excuse putting the business at unnecessary risk, and it's irresponsible to let customers think you've remediated the situation by buffing out the scratches just because they don't want to wait for the body work.

(That's part of why I stopped doing security consulting many years ago. Clients wanted guarantees I couldn't give them, or me to give them approval for expedience that didn't match their stated threat stance. If someone at the customer wants to say it's all better because they deleted the php script payload from the web root, they can do that, but I'm not going to.)

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

mindphlux posted:

no, I actually have asked about 5 times for examples of how you guys propose to handle malware/virus problems in a reasonable amount of time. I outlined my SOP line by line, please outline yours line by line.

I don't claim that anything you're saying is technically incorrect, but flattening a system or spending hours isolating machines and doing packet/process traces every time a machine gets some java exploit or something is not practical.

You say it's not practical, but treating it as a hardware failure and taking it out of circulation until it's restored from zero is something that actual large companies do. Give them a loaner like you would if their drive died, and restore them from backup.

Your position seems to be that while it's the right thing, it takes too long. Maybe that's the case for your MSP business, and that the service you provide is "as much as we can do in an hour" rather than "clean according to best practices". That could even be what your customers prefer, hopefully on an informed basis. Even then, why would you recommend that to an individual who hasn't indicated that they're similarly time-constrained? Why not recommend the right thing to start with?

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

mindphlux posted:

w/rt clients : some have spare machines, some have budgets where the concept of 'a spare machine' is laughed at. 'we'll buy it when we need it!!' or 'why are you asking me to spend $1000 and hours of billable time on something that I'm not going to use'. I'm good at persuading and justifying a responsible approach to IT, but unless you've worked for a MSP, I don't think you'd understand what you're up against.

What do you tell customers when you return their computer to them? That you cleaned it up a bit; that you've verified it's clean; that it's safe to use? I've been a consultant, I understand that customers don't always want to buy the thing you genuinely think is best for them. I'm curious about how you frame what they *do* ask for and get.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Thanks, I understand better now. Appreciate it.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Wiggly Wayne DDS posted:

It really does though, here's a breakdown of x86 security:

That's not a fun paper to read.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Ynglaur posted:

Oh cool! She had stopped blogging for awhile, so I thought she had fallen off the face of the earth or angered Put in or something.

None of us want this thread, but you especially don't want this thread.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Khablam posted:

Your ranting and cries of fraud and negligence over the posted SOP are an insane reaction but maybe I'm just expecting too much from a yospos poster.

Don't be racist.

Adbot
ADBOT LOVES YOU

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Mido posted:

OSI is posting not to attack you

Well...

  • Locked thread