SlideShare uma empresa Scribd logo
1 de 41
Man-in-the-Browser Attack Vectors Gunter Ollmann – Chief Security Strategist IBM Internet Security Systems gollmann@us.ibm.com  http://blogs.iss.net/ IBM Date/Time:  Tuesday  (November 18, 2008)   4:00pm - 5:00pm Topic:  Web 2.0
[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object]
Threat Evolution
Threat Evolution – The Old Days ,[object Object],[object Object],[object Object],[object Object]
Threat Evolution – Abstraction ,[object Object],[object Object],[object Object],[object Object]
Threat Evolution – Parasitic Era ,[object Object],[object Object],[object Object],[object Object]
Man-in-the- Middle  – old news?
Intercepting Traffic – Man-in-the-middle Customer PC Web Services Man-in-the-middle A host under the attackers control is inserted as a proxy between the victim’s system and their destination ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Limitations of Man-in-the-middle ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Injecting in to the Web browser ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Understanding the Web browser Threat http://www.technicalinfo.net/papers/UnderstandingTheWebBrowserThreat.html
Intercepting Traffic – Man-in-the-browser Trojan Application Local Proxy Agent OS Hooking Keyloggers, Screen grabber TCP/IP Stack Interception Packet inspection, pre/post SSL logging System Reconfiguration DNS Settings, Local HOST file, Routing tables, WPAD and Proxy settings Traditional Malware Operates and intercepts data at points through  which the Web browser  must communicate  Man-in-the-browser Malware hooks inside the Web browser
API Hooking Malware Application The Web browser WinInet httpsendrequest(), navigateto() Winsock TCP/IP stack Clean System Internet Malware Proxying Web browser data . Application The Web browser WinInet httpsendrequest(), navigateto() Winsock TCP/IP stack Internet Infected System Manipulate Copy, redirect, script, change, insert, sell.
Man-in-the-browser Malware  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crime with Man-in-the- Browser
Traditional Banking Malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MITB – Grabbing Login Credentials ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Pre-login First page of login sequence is manipulated Login Multiple fields & pages added to the login sequence Post-login Authenticated user asked additional security questions
MITB – Grabbing Login Credentials Original pre-login fields UID, password & site Modified pre-login fields Now with ATM details and MMN New fields added MITB malware inserted additional fields. Records them, and sends them to the attacker
MITB – Grabbing Login Credentials Modified pre-login fields Now with ATM details and MMN Programmable Interfaces Malware authors developing an  extensible platform that can be  sold or rented to other criminals Configuration files XML support, dynamic updates
Hiding in Plain Sight
MITB – Focusing on the Money Transfer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MITB – State-of-the-art Banking Proxy Trojan Attacker makes off with the money and the victim is unaware a transaction has occurred Victim logs in to the bank “securely” and banks “normally” Proxy Trojan starts functioning once the victim logs in Intercepts each transaction Calculates what is supposed to be in the account Modifies the page that appears to the victim Steals some money
Honing in on the Transaction Customer logs in Authenticates successfully and securely Transfers Customer navigates to the fund transfer interface Validation Customer asked to provide a validation key for the transaction – may include a bank-issued “salt” value 2 nd  Submission Customer clicks “Submit” to proceed Confirmation Transfer complete Transaction Validation As an anti-keylogger and anti-replay technique, some banking applications require the use of a separate “ validation” code for each transaction Payment Details The customer proceeds with entering transfer details (from, to, value, when, etc.) Submission Customer clicks “Submit” to proceed Submit Submit
Honing in on the Transaction – Malware Injection 2 nd  Submission Customer clicks “Submit” to proceed Payment Details Customer enters their transfer payment details Background Malware In the background, the proxy Trojan has created it’s own transfer details Submission Customer clicks “Submit” to proceed Validation Customer asked to provide a validation key for the transaction – maybe including a bank-issued “salt” value Malware Fakes The malware fakes a “validation failure” even though the fake transaction worked. Prompts user to “try again” 2 nd  Validation Customer enters another validation code 3 rd  Submission Malware submits the original “real” customer transfer information Confirmation 2 nd  transation is confirmed back to the customer.  In reality, two transfers have been conducted Submit Submit Submit
Preventing Transaction Injection – Banks Response ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Engineering past CAP Transfers - Original Transaction Validation Assuming the customer has already logged in, they must successfully navigate multiple pages to complete a funds transfer.  Page (1) Which FROM account? Page (2) How much? Where TO? Page (3) Are details correct? Page (4) CAP  instructions and CODE? Page (5) Validation complete!
Social Engineering past CAP Transfers - Injected  Transaction Monitoring The malware continuously monitors the customer as they navigate the pages to conduct a funds transfer HTML Page Insertion An extra page is inserted in to the transfer sequence and requests an additional CAP “ Security Code”.  Page (1) Which FROM account? Page (2) How much? Where TO? Page (3) Are details correct? Page (4) CAP  instructions and CODE? Page (5) Security CODE? Page (6) Validation complete!
Social Engineering past CAP Transfers - Injected ,[object Object],[object Object],To Account:   9812-3451-23 Amount:   $1,500.00 Validation code: 456123 Validation code: 998543 Security Code: 3133731137 Amount: $1,500.00 Validation Code Calculation Customer must type in the “To Account” number and “Amount” in to the code calculator. The calculator also uses PIN, Date and time information to calculate the validation code Page Insertion As part of the process, the attacker inserts a fake page (extra step in “banks” process) in to the Web browser.  The fake page asks the victim to use their calculator again – but to use a “Security Code” which is in fact the attackers bank account – and submits the second transaction.
SMS & Out-of-band Validation/Reporting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
An Entwined Threat
Man-in-the-browser Ramifications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Future Man-in-the-Browser Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROTECTION STRATEGIES
The Elephant in the Room ,[object Object]
Physical Client-side Validation ,[object Object],[object Object],[object Object],[object Object]
Protection Improvement Mindset ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Improving Web application design ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Questions? Gunter Ollmann –  Chief Security Strategist IBM Internet Security Systems gollmann@us.ibm.com  http://blogs.iss.net/ IBM Date/Time:  Tuesday  (November 18, 2008)   4:00pm - 5:00pm Topic:  Web 2.0

Mais conteúdo relacionado

Mais procurados

Man In The Browser
Man In The BrowserMan In The Browser
Man In The BrowserSave Manos
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisCSCJournals
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568IJRAT
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDECTM360
 
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESAM Publications,India
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - KloudlearnKloudLearn
 
Isaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdfIsaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdfMarco Morana
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSonionid12
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment SystemsDomenico Catalano
 
Internet banking applications' security
Internet banking applications' securityInternet banking applications' security
Internet banking applications' securitySecuRing
 
Keeping hackers out of your POS!
Keeping hackers out of your POS!Keeping hackers out of your POS!
Keeping hackers out of your POS!AVG Technologies AU
 
Phishing Education
Phishing EducationPhishing Education
Phishing EducationBrandProtect
 

Mais procurados (20)

Man In The Browser
Man In The BrowserMan In The Browser
Man In The Browser
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Jon ppoint
Jon ppointJon ppoint
Jon ppoint
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
 
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Isaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdfIsaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdf
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment Systems
 
Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9
 
Internet banking applications' security
Internet banking applications' securityInternet banking applications' security
Internet banking applications' security
 
Keeping hackers out of your POS!
Keeping hackers out of your POS!Keeping hackers out of your POS!
Keeping hackers out of your POS!
 
Phishing Education
Phishing EducationPhishing Education
Phishing Education
 

Semelhante a CSI2008 Gunter Ollmann Man-in-the-browser

Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh
 
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...PROIDEA
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
Security Compliance Web Application Risk Management
Security Compliance Web Application Risk ManagementSecurity Compliance Web Application Risk Management
Security Compliance Web Application Risk ManagementMarco Morana
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpJoann Davis
 
Combating Constantly Evolving Advanced Threats – Solution Architecture
Combating Constantly Evolving Advanced Threats – Solution ArchitectureCombating Constantly Evolving Advanced Threats – Solution Architecture
Combating Constantly Evolving Advanced Threats – Solution ArchitectureIBM Sverige
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security SolutionMobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solutionguestd1c15
 
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)DCIT, a.s.
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryAmmar WK
 
Ransomware
RansomwareRansomware
RansomwareG Prachi
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserSource Conference
 
Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperMan in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperHai Nguyen
 
Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Asia Pte Ltd
 
Online Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat ModelOnline Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat ModelEoin Keary
 
Improving Network Security with IP &DNS Reputation Services
Improving Network Security with IP &DNS Reputation ServicesImproving Network Security with IP &DNS Reputation Services
Improving Network Security with IP &DNS Reputation Serviceswhitehat 'People'
 
Script based malware detection in online banking
Script based malware detection in online bankingScript based malware detection in online banking
Script based malware detection in online bankingJakub Kałużny
 

Semelhante a CSI2008 Gunter Ollmann Man-in-the-browser (20)

E banking security
E banking securityE banking security
E banking security
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
 
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
 
Network security
Network securityNetwork security
Network security
 
Security Compliance Web Application Risk Management
Security Compliance Web Application Risk ManagementSecurity Compliance Web Application Risk Management
Security Compliance Web Application Risk Management
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
 
Combating Constantly Evolving Advanced Threats – Solution Architecture
Combating Constantly Evolving Advanced Threats – Solution ArchitectureCombating Constantly Evolving Advanced Threats – Solution Architecture
Combating Constantly Evolving Advanced Threats – Solution Architecture
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security SolutionMobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
 
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
 
Ransomware
RansomwareRansomware
Ransomware
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
 
Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperMan in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaper
 
Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service
 
Online Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat ModelOnline Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat Model
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Improving Network Security with IP &DNS Reputation Services
Improving Network Security with IP &DNS Reputation ServicesImproving Network Security with IP &DNS Reputation Services
Improving Network Security with IP &DNS Reputation Services
 
Script based malware detection in online banking
Script based malware detection in online bankingScript based malware detection in online banking
Script based malware detection in online banking
 
Secure client
Secure clientSecure client
Secure client
 

Último

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Último (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

CSI2008 Gunter Ollmann Man-in-the-browser

  • 1. Man-in-the-Browser Attack Vectors Gunter Ollmann – Chief Security Strategist IBM Internet Security Systems gollmann@us.ibm.com http://blogs.iss.net/ IBM Date/Time: Tuesday (November 18, 2008)   4:00pm - 5:00pm Topic: Web 2.0
  • 2.
  • 3.
  • 5.
  • 6.
  • 7.
  • 8. Man-in-the- Middle – old news?
  • 9.
  • 10.
  • 11.  
  • 12.
  • 13. Intercepting Traffic – Man-in-the-browser Trojan Application Local Proxy Agent OS Hooking Keyloggers, Screen grabber TCP/IP Stack Interception Packet inspection, pre/post SSL logging System Reconfiguration DNS Settings, Local HOST file, Routing tables, WPAD and Proxy settings Traditional Malware Operates and intercepts data at points through which the Web browser must communicate Man-in-the-browser Malware hooks inside the Web browser
  • 14. API Hooking Malware Application The Web browser WinInet httpsendrequest(), navigateto() Winsock TCP/IP stack Clean System Internet Malware Proxying Web browser data . Application The Web browser WinInet httpsendrequest(), navigateto() Winsock TCP/IP stack Internet Infected System Manipulate Copy, redirect, script, change, insert, sell.
  • 15.
  • 17.
  • 18.
  • 19. MITB – Grabbing Login Credentials Original pre-login fields UID, password & site Modified pre-login fields Now with ATM details and MMN New fields added MITB malware inserted additional fields. Records them, and sends them to the attacker
  • 20. MITB – Grabbing Login Credentials Modified pre-login fields Now with ATM details and MMN Programmable Interfaces Malware authors developing an extensible platform that can be sold or rented to other criminals Configuration files XML support, dynamic updates
  • 22.
  • 23. MITB – State-of-the-art Banking Proxy Trojan Attacker makes off with the money and the victim is unaware a transaction has occurred Victim logs in to the bank “securely” and banks “normally” Proxy Trojan starts functioning once the victim logs in Intercepts each transaction Calculates what is supposed to be in the account Modifies the page that appears to the victim Steals some money
  • 24. Honing in on the Transaction Customer logs in Authenticates successfully and securely Transfers Customer navigates to the fund transfer interface Validation Customer asked to provide a validation key for the transaction – may include a bank-issued “salt” value 2 nd Submission Customer clicks “Submit” to proceed Confirmation Transfer complete Transaction Validation As an anti-keylogger and anti-replay technique, some banking applications require the use of a separate “ validation” code for each transaction Payment Details The customer proceeds with entering transfer details (from, to, value, when, etc.) Submission Customer clicks “Submit” to proceed Submit Submit
  • 25. Honing in on the Transaction – Malware Injection 2 nd Submission Customer clicks “Submit” to proceed Payment Details Customer enters their transfer payment details Background Malware In the background, the proxy Trojan has created it’s own transfer details Submission Customer clicks “Submit” to proceed Validation Customer asked to provide a validation key for the transaction – maybe including a bank-issued “salt” value Malware Fakes The malware fakes a “validation failure” even though the fake transaction worked. Prompts user to “try again” 2 nd Validation Customer enters another validation code 3 rd Submission Malware submits the original “real” customer transfer information Confirmation 2 nd transation is confirmed back to the customer. In reality, two transfers have been conducted Submit Submit Submit
  • 26.
  • 27. Social Engineering past CAP Transfers - Original Transaction Validation Assuming the customer has already logged in, they must successfully navigate multiple pages to complete a funds transfer.  Page (1) Which FROM account? Page (2) How much? Where TO? Page (3) Are details correct? Page (4) CAP instructions and CODE? Page (5) Validation complete!
  • 28. Social Engineering past CAP Transfers - Injected  Transaction Monitoring The malware continuously monitors the customer as they navigate the pages to conduct a funds transfer HTML Page Insertion An extra page is inserted in to the transfer sequence and requests an additional CAP “ Security Code”. Page (1) Which FROM account? Page (2) How much? Where TO? Page (3) Are details correct? Page (4) CAP instructions and CODE? Page (5) Security CODE? Page (6) Validation complete!
  • 29.
  • 30.
  • 32.
  • 33.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.  
  • 41. Questions? Gunter Ollmann – Chief Security Strategist IBM Internet Security Systems gollmann@us.ibm.com http://blogs.iss.net/ IBM Date/Time: Tuesday (November 18, 2008)   4:00pm - 5:00pm Topic: Web 2.0