Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: InfoSec Handlers Diary Blog InfoSec Handlers Diary Blog


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

IRS goes FTC

Published: 2007-06-13
Last Updated: 2007-06-13 20:37:41 UTC
by Maarten Van Horenbeeck (Version: 3)
0 comment(s)

After the recent BBB and IRS scams, Sam Masiello has reported new scam e-mails spoofed from an FTC e-mail address. These are trying to convince you that you have filed a complaint, of which a copy is supposedly included in the attachment.

This attachment is still an RTF file with a malicious embedded object. These attacks are targeted to executives and management, so if your organization was affected by the previous ones, make sure your employees are aware of this one as well.

Keywords:
0 comment(s)

FBI's Operation Bot Roast

Published: 2007-06-13
Last Updated: 2007-06-13 19:51:52 UTC
by Maarten Van Horenbeeck (Version: 2)
0 comment(s)
Jonny wrote in pointing us to this FBI press release (more here). In this document, the FBI provides some more information on their Operation Bot Roast, which recently hit the news stands as a result of the arrest of suspected spammer Robert Alan Soloway.
 
No doubt this is great news for the community. Spamming, merely one threat exacerbated by botnets, has become a huge problem, and technical means are obviously not the best way to fix it. Spam will continue to move closer in appearance to regular mail, making it difficult for us to filter it out, and making e-mail less and less usable as a means of communication. As such, government intervention to stop these practices should be applauded.
 
Whether these arrests will do much to relieve the increasing botnet count remains to be seen. In order to prevent these botnets from being taken over by foreign botherders, law will need to be aligned globally. In addition, the fact that these machines got infected and remained part of a botnet in the first place shows there is a problem with the ongoing security practices of their users, administrators or hosters. To relieve this threat, we as security practitioners also need to do our bit to monitor the networks under our control, understand we have a problem, and take corrective action. In combination with enforced legislation, this will move us forward.
 
Cheers,
Maarten Van Horenbeeck
Keywords:
0 comment(s)

Investigating and responding to suspicious Office files

Published: 2007-06-13
Last Updated: 2007-06-13 18:28:51 UTC
by Maarten Van Horenbeeck (Version: 2)
0 comment(s)

A major step in incident handling is to confirm whether a security incident is in fact taking place. Excessive handling of false positives can also cost an organization dearly in the long run. Recently, attacks using Office (or other office applications such as Ichitaro) as a vector have become more popular, making this identification stage a bit more difficult.

Some small tools can come in really useful if you want to avoid attaching a debugger to your Word session. Consider using your stock anti-virus. In many cases, it might be able to spot malicious files when they exploit a known vulnerability. Some names attributed to malicious Word files so far appear to generically trigger on malicious files:

Trojan-Dropper.MSWord.1Table.bo
Exploit.MSWord.Gen
Exploit-1Table


Others vendors decided not to include patterns for exploitative Word documents, but provide them for their payload only, when it gets executed. While this generates less false positives, it also provides less protection for malicious code that is targeted, or has only recently been distributed. It also misses the exploit on the e-mail gateway. You may want to check in with your vendor to see what their approach to the issue is.

Another tool that is still useful is the regular hex-editor, or even strings. Seeing the MZ ‘magic’ and a stub executable, or even the UPX markers in a Word file is unusual:

dhahran:/tmp# hexdump -C malicious.doc | grep "UPX"
0103d0 55 50 58 30 00 00 00 00 00 20 12 00 00 10 00 00 |UPX0..... ......|
0103f0 00 00 00 00 80 00 00 e0 55 50 58 31 00 00 00 00 |........UPX1....|
010420 55 50 58 32 00 00 00 00 00 10 00 00 00 60 12 00 |UPX2.........`..|
0105e0 55 50 58 21 0c 09 05 06 5c 5d 41 a8 32 6d b5 68 |UPX!....\]A.2m.h|


Other useful tools have been released by Sourcefire and SecureWorks. SourceFire’s OfficeCat scans an Office file for the exploitation of a long list of known vulnerabilities.

Sourcefire OFFICE CAT v2
* Microsoft Office File Checker *
Processing c:\office\malcode2.doc
VULNERABLE: CVE-2006-2492


SecureWork’s Fess, short for File Exploit Scanning System, is an open-source tool that scans files for exploits using a Snort-like inspection language. Its basic release does not contain Office sigs, but one was released a few months later on the Fess-users mailing list. It’s a powerful tool, but you may need to write signatures yourself based on what specifically you are looking for. It’s a tool that would allow you to scan Office files for shellcode, for example.

Microsoft also has tools to bring clarity into the format. In essence, Microsoft Office files are of OLE Structured Storage nature, and consist of numerous ‘storage’ and ‘stream’ items. In order to identify each of the storage items, at the end of 2006, Microsoft released a tool called STG, which can display the different structure components and their contents. This can prove valuable when you’re trying to identify malicious components. Many of you may have worked with a similar tool, DocFile viewer, part of Visual Studio.




In May of this year, Microsoft also released two tools to control the Office targeting issue. The Microsoft Office Isolated Conversion Environment converts Office 2003 documents to the Office Open XML format. This should strip out any exploits that are present and present the file ‘safely’ to recent Office versions. There are some constraints, such as macros, smart tag data and embedded documents, which cannot be converted.

The other, File Block functionality for Office allows administrators to restrict supported file types for Office through the registry and GPO. By testing and combining both applications, an organization can proactively prepare an emergency plan that can be activated should a significant threat appear.

Do you have other tools or methodology you use to deal with this threat? Get in touch!

Update: several users have written in with the tool FileAlyzer, part of Spybot Search & Destroy. Thanks!

--
Maarten Van Horenbeeck

Keywords:
0 comment(s)
Diary Archives